A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/beyondmachines1/statuses/114591011309873041",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2025-05-29T12:01:10Z",
"url": "https://infosec.exchange/@beyondmachines1/114591011309873041",
"attributedTo": "https://infosec.exchange/users/beyondmachines1",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/beyondmachines1/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/beyondmachines1/statuses/114591011309873041",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2025-05-29:objectId=275883999:objectType=Conversation",
"content": "<p>DragonForce ransomware exploits SimpleHelp vulnerabilities in MSP supply chain attack</p><p>Sophos reported a supply chain attack by the DragonForce ransomware group that compromised an unidentified Managed Service Provider through a chain of three critical SimpleHelp RMM vulnerabilities (CVE-2024-57726, CVE-2024-57727, CVE-2024-57728), allowing attackers to use the MSP's own infrastructure to deploy ransomware and steal data from multiple downstream customers.</p><p>**A compromise of a trusted vendor has terrible and far reaching consequences. There isn't an obvious solution. You need to do a lot of little things and do them consistently - vendor assessment and questionnaires putting formal pressure, isolation and access restrictions adding a layer of prevention and patching and intrusion detection as an internal layer of defense.**<br /><a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/knowledge\" class=\"mention hashtag\" rel=\"tag\">#<span>knowledge</span></a> <a href=\"https://infosec.exchange/tags/awareness\" class=\"mention hashtag\" rel=\"tag\">#<span>awareness</span></a><br /><a href=\"https://beyondmachines.net/event_details/dragonforce-ransomware-exploits-simplehelp-vulnerabilities-in-msp-supply-chain-attack-6-8-2-z-t/gD2P6Ple2L\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">beyondmachines.net/event_detai</span><span class=\"invisible\">ls/dragonforce-ransomware-exploits-simplehelp-vulnerabilities-in-msp-supply-chain-attack-6-8-2-z-t/gD2P6Ple2L</span></a></p>",
"contentMap": {
"en": "<p>DragonForce ransomware exploits SimpleHelp vulnerabilities in MSP supply chain attack</p><p>Sophos reported a supply chain attack by the DragonForce ransomware group that compromised an unidentified Managed Service Provider through a chain of three critical SimpleHelp RMM vulnerabilities (CVE-2024-57726, CVE-2024-57727, CVE-2024-57728), allowing attackers to use the MSP's own infrastructure to deploy ransomware and steal data from multiple downstream customers.</p><p>**A compromise of a trusted vendor has terrible and far reaching consequences. There isn't an obvious solution. You need to do a lot of little things and do them consistently - vendor assessment and questionnaires putting formal pressure, isolation and access restrictions adding a layer of prevention and patching and intrusion detection as an internal layer of defense.**<br /><a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/knowledge\" class=\"mention hashtag\" rel=\"tag\">#<span>knowledge</span></a> <a href=\"https://infosec.exchange/tags/awareness\" class=\"mention hashtag\" rel=\"tag\">#<span>awareness</span></a><br /><a href=\"https://beyondmachines.net/event_details/dragonforce-ransomware-exploits-simplehelp-vulnerabilities-in-msp-supply-chain-attack-6-8-2-z-t/gD2P6Ple2L\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">beyondmachines.net/event_detai</span><span class=\"invisible\">ls/dragonforce-ransomware-exploits-simplehelp-vulnerabilities-in-msp-supply-chain-attack-6-8-2-z-t/gD2P6Ple2L</span></a></p>"
},
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/infosec",
"name": "#infosec"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/knowledge",
"name": "#knowledge"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/awareness",
"name": "#awareness"
}
],
"replies": {
"id": "https://infosec.exchange/users/beyondmachines1/statuses/114591011309873041/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/beyondmachines1/statuses/114591011309873041/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/beyondmachines1/statuses/114591011309873041/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/beyondmachines1/statuses/114591011309873041/likes",
"type": "Collection",
"totalItems": 0
},
"shares": {
"id": "https://infosec.exchange/users/beyondmachines1/statuses/114591011309873041/shares",
"type": "Collection",
"totalItems": 1
}
}