Matthias Schulze's Avatar

Matthias Schulze

@percepticon.bsky.social

PhD in political science, studying infosec, cyber conflict & information war at IFSH. Self-taught hacker & blue team. Blog and podcast about my work over at https://percepticon.de or https://ioc.exchange/@percepticon

810 Followers  |  313 Following  |  2,383 Posts  |  Joined: 25.08.2023
Posts Following

Posts by Matthias Schulze (@percepticon.bsky.social)

Preview
Cyber Command disrupted Iranian comms, sensors, top general says U.S. Cyber Command conducted online attacks against Iranian communications systems that the country’s top general said set the stage for the joint bombing campaign with Israel.

Cyber Command disrupted Iranian comms, sensors, top general says #cybersecurity #infosec

05.03.2026 03:44 — 👍 2    🔁 0    💬 0    📌 0
Preview
Cyber, Space Commands were among 'first movers' in strikes on Iran: top general ]]>

Cyber, Space Commands were among 'first movers' in strikes on Iran: top general #cybersecurity #infosec

04.03.2026 23:10 — 👍 1    🔁 1    💬 0    📌 0
Preview
Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience Aeternum operates on smart contracts, making its command-and-control (C&C) infrastructure difficult to disrupt. The post Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience appeared first on SecurityWeek.

Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience #cybersecurity #infosec

04.03.2026 18:31 — 👍 1    🔁 0    💬 0    📌 0
Preview
APT37 hackers use new malware to breach air-gapped networks North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance. [...]

APT37 hackers use new malware to breach air-gapped networks #cybersecurity #infosec

04.03.2026 15:58 — 👍 0    🔁 0    💬 0    📌 0

You don't need to hack a device when you can get all you need from real-time data brokerages

The personal data surveillance economy has now become fully integrated into the operations of the police state

Only rigorous and independent oversight of both sectors can preserve rights & freedoms

03.03.2026 16:31 — 👍 50    🔁 20    💬 1    📌 0
Preview
WLAN-Sicherheitslücke AirSnitch: Client-Isolation selbst in WPA3-Enterprise ausgehebelt Die WLAN-Sicherheitslücke AirSnitch umgeht die WLAN-Client-Isolation, selbst WPA3-Enterprise ist betroffen. Der Artikel WLAN-Sicherheitslücke AirSnitch: Client-Isolation selbst in WPA3-Enterprise ausgehebelt erschien zuerst auf TARNKAPPE.INFO

WLAN-Sicherheitslücke AirSnitch: Client-Isolation selbst in WPA3-Enterprise ausgehebelt #cybersecurity #infosec

04.03.2026 03:44 — 👍 1    🔁 0    💬 0    📌 0
Preview
Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to authenticate to sensitive Gemini endpoints and access private data. The findings come from Truffle Security, which discovered nearly 3,000 Google API keys (identified by the prefix "AIza") embedded in client-side code to provide Google-related services like

Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement #cybersecurity #infosec

03.03.2026 23:10 — 👍 0    🔁 0    💬 0    📌 0
Preview
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.

A full iOS exploitation toolkit, "Coruna," has been found in the wild, hacking iPhones that visited infected websites, used by Russian spies targeting Ukrainians and thieves targeting Chinese crypto holders. And it may have been originally created for the US government. www.wired.com/story/coruna...

03.03.2026 19:04 — 👍 124    🔁 104    💬 9    📌 8
Preview
A systematic review on botnet defense mechanisms: past, present and future Volume 10, Issue 1, December 2026, Page 1-27 .

A systematic review on botnet defense mechanisms: past, present and future #cybersecurity #infosec

03.03.2026 18:30 — 👍 1    🔁 0    💬 0    📌 0
Preview
Cybercom didn’t tell troops to disable location services or uninstall apps, military officials say, after viral message spread amid Iran operation Multiple defense officials told DefenseScoop Sunday that a viral message purporting to be from U.S. Cyber Command wasn’t sent by the command. The message claimed Cybercom was warning troops to turn off location services from their electronic devices and that multiple commercial applications were compromised, all amid the ongoing military operations against Iran. The message — reviewed by DefenseScoop — was circulating in some military circles and social media Sunday. It urged “all U.S. service members” to turn off location services from their electronic devices. It also said that Uber, Snapchat and a food delivery service that operates in the Middle East known as Talabat were “compromised.” “​​Due to operational security concerns, U.S. Cyber Command does not comment nor discuss cyber intelligence, plans, operations, capabilities, or effects,” one official told DefenseScoop, requesting attribution as a Department of War official, the preferred name for the Pentagon under the Trump administration. “The command did not issue messages to US service members to turn off location services on their electronic devices and did not issue messages that applications had been compromised.” The statement did not address where the correspondence originated from and why it was circulating in the military community. Capt. Tim Hawkins, a spokesperson for U.S. Central Command, said the message was “false.” Centcom is responsible for overseeing U.S. military operations in the Middle East. “We have no indication that this rumor is true regarding Uber,” a spokesperson for the company told DefenseScoop. Uber also took to social media to respond to accounts spreading the message, calling it an “unsubstantiated rumor.” Following the launch of joint U.S.-Israel strikes against Iran starting Saturday, false and misleading information about the operation have flooded social media, WIRED reported. U.S. Central Command said Iran had issued “multiple bogus claims” over the last two days about the operation. The origin of the message is unclear, however, and it spread through various military channels on Sunday. An account with more than 40,000 followers posted the message on social media, which had racked up hundreds of thousands of views, and pushed the claim, as did other users. While U.S. officials denied the validity of the message, concerns have previously been raised about Iran’s cyber capabilities. Last summer, the Cybersecurity and Infrastructure Security Agency (CISA) warned that Iranian-affiliated cyber actors “often exploit targets of opportunity” based on unpatched or outdated software.  The so-called 12-day War between Iran and Israel last year revealed how Tehran-linked actors used “a broad range of operations designed to exert psychological pressure, collect tactical intelligence, enforce deterrence against third countries, and maintain domestic control,” according to the Middle East Institute. MEI said Iran had also “intensified its psychological operations through the use of AI to generate and disseminate disinformation.”  The new military campaign against Iran that was launched Saturday, known as Operation Epic Fury, is ongoing. U.S. Central Command said Sunday that three U.S. service members were killed during the operation. Cybercom referred DefenseScoop to the Pentagon for comment Sunday. Spokespeople for Snapchat and Talabat did not immediately respond to the publication’s questions. The post Cybercom didn’t tell troops to disable location services or uninstall apps, military officials say, after viral message spread amid Iran operation appeared first on DefenseScoop.

Cybercom didn’t tell troops to disable location services or uninstall apps, military officials say, after viral message spread amid Iran operation #cybersecurity #infosec

03.03.2026 15:59 — 👍 2    🔁 2    💬 0    📌 0
Preview
Who is the Kimwolf Botmaster “Dort”? In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to build Kimwolf, the world’s largest and most disruptive botnet. Since then, the person in control of Kimwolf — who goes by the handle “Dort” — has coordinated a barrage of distributed denial-of-service (DDoS), doxing and email flooding attacks against the researcher and this author, and more recently caused a SWAT team to be sent to the researcher’s home. This post examines what is knowable about Dort based on public information. A public “dox” created in 2020 asserted Dort was a teenager from Canada (DOB August 2003) who used the aliases “CPacket” and “M1ce.” A search on the username CPacket at the open source intelligence platform OSINT Industries finds a GitHub account under the names Dort and CPacket that was created in 2017 using the email address jay.miner232@gmail.com. Image: osint.industries. The cyber intelligence firm Intel 471 says jay.miner232@gmail.com was used between 2015 and 2019 to create accounts at multiple cybercrime forums, including Nulled (username “Uubuntuu”) and Cracked (user “Dorted”); Intel 471 reports that both of these accounts were created from the same Internet address at Rogers Canada (99.241.112.24). Dort was an extremely active player in the Microsoft game Minecraft who gained notoriety for their “Dortware” software that helped players cheat. But somewhere along the way, Dort graduated from hacking Minecraft games to enabling far more serious crimes. Dort also used the nickname DortDev, an identity that was active in March 2022 on the chat server for the prolific cybercrime group known as LAPSUS$. Dort peddled a service for registering temporary email addresses, as well as “Dortsolver,” code that could bypass various CAPTCHA services designed to prevent automated account abuse. Both of these offerings were advertised in 2022 on SIM Land, a Telegram channel dedicated to SIM-swapping and account takeover activity. The cyber intelligence firm Flashpoint indexed 2022 posts on SIM Land by Dort that show this person developed the disposable email and CAPTCHA bypass services with the help of another hacker who went by the handle “Qoft.” “I legit just work with Jacob,” Qoft said in 2022 in reply to another user, referring to their exclusive business partner Dort. In the same conversation, Qoft bragged that the two had stolen more than $250,000 worth of Microsoft Xbox Game Pass accounts by developing a program that mass-created Game Pass identities using stolen payment card data. Who is the Jacob that Qoft referred to as their business partner? The breach tracking service Constella Intelligence finds the password used by jay.miner232@gmail.com was reused by just one other email address: jacobbutler803@gmail.com. Recall that the 2020 dox of Dort said their date of birth was August 2003 (8/03). Searching this email address at DomainTools.com reveals it was used in 2015 to register several Minecraft-themed domains, all assigned to a Jacob Butler in Ottawa, Canada and to the Ottawa phone number 613-909-9727. Constella Intelligence finds jacobbutler803@gmail.com was used to register an account on the hacker forum Nulled in 2016, as well as the account name “M1CE” on Minecraft. Pivoting off the password used by their Nulled account shows it was shared by the email addresses j.a.y.m.iner232@gmail.com and jbutl3@ocdsb.ca, the latter being an address at a domain for the Ottawa-Carelton District School Board. Data indexed by the breach tracking service Spycloud suggests that at one point Jacob Butler shared a computer with his mother and a sibling, which might explain why their email accounts were connected to the password “jacobsplugs.” Neither Jacob nor any of the other Butler household members responded to requests for comment. The open source intelligence service Epieos finds jacobbutler803@gmail.com created the GitHub account “MemeClient.” Meanwhile, Flashpoint indexed a deleted anonymous Pastebin.com post from 2017 declaring that MemeClient was the creation of a user named CPacket — one of Dort’s early monikers. Why is Dort so mad? On January 2, KrebsOnSecurity published The Kimwolf Botnet is Stalking Your Local Network, which explored research into the botnet by Benjamin Brundage, founder of the proxy tracking service Synthient. Brundage figured out that the Kimwolf botmasters were exploiting a little-known weakness in residential proxy services to infect poorly-defended devices — like TV boxes and digital photo frames — plugged into the internal, private networks of proxy endpoints. By the time that story went live, most of the vulnerable proxy providers had been notified by Brundage and had fixed the weaknesses in their systems. That vulnerability remediation process massively slowed Kimwolf’s ability to spread, and within hours of the story’s publication Dort created a Discord server in my name that began publishing personal information about and violent threats against Brundage, Yours Truly, and others. Dort and friends incriminating themselves by planning swatting attacks in a public Discord server. Last week, Dort and friends used that same Discord server (then named “Krebs’s Koinbase Kallers”) to threaten a swatting attack against Brundage, again posting his home address and personal information. Brundage told KrebsOnSecurity that local police officers subsequently visited his home in response to a swatting hoax which occurred around the same time that another member of the server posted a door emoji and taunted Brundage further. Dort, using the alias “Meow,” taunts Synthient founder Ben Brundage with a picture of a door. Someone on the server then linked to a cringeworthy (and NSFW) new Soundcloud diss track recorded by the user DortDev that included a stickied message from Dort saying, “Ur dead nigga. u better watch ur fucking back. sleep with one eye open. bitch.” “It’s a pretty hefty penny for a new front door,” the diss track intoned. “If his head doesn’t get blown off by SWAT officers. What’s it like not having a front door?” With any luck, Dort will soon be able to tell us all exactly what it’s like. Update, 10:29 a.m.: Jacob Butler responded to requests for comment, speaking with KrebsOnSecurity briefly via telephone. Butler said he didn’t notice earlier requests for comment because he hasn’t really been online since 2021, after his home was swatted multiple times. He acknowledged making and distributing a Minecraft cheat long ago, but said he hasn’t played the game in years and was not involved in Dortsolver or any other activity attributed to the Dort nickname after 2021. “It was a really old cheat and I don’t remember the name of it,” Butler said of his Minecraft modification. “I’m very stressed, man. I don’t know if people are going to swat me again or what. After that, I pretty much walked away from everything, logged off and said fuck that. I don’t go online anymore. I don’t know why people would still be going after me, to be completely honest.” When asked what he does for a living, Butler said he mostly stays home and helps his mom around the house because he struggles with autism and social interaction. He maintains that someone must have compromised one or more of his old accounts and is impersonating him online as Dort. “Someone is actually probably impersonating me, and now I’m really worried,” Butler said. “This is making me relive everything.”  

Who is the Kimwolf Botmaster “Dort”? #cybersecurity #infosec

03.03.2026 03:44 — 👍 1    🔁 0    💬 0    📌 0
Preview
OpenClaw, but in containers: Meet NanoClaw A smaller, security-conscious take on the viral AI agent platform Interview  Ideally, you shouldn't have to defend yourself against your own AI agent. But we don't live in an ideal world and an unrestrained agent can cause a ton of damage.…

OpenClaw, but in containers: Meet NanoClaw #cybersecurity #infosec

02.03.2026 23:10 — 👍 3    🔁 2    💬 0    📌 0
Preview
Inside the plan to kill Ali Khamenei Israel spent years hacking Tehran’s traffic cameras and monitoring bodyguards ahead of the assassination of Iran’s supreme leader

Ok, krass: »Nearly all the traffic cameras in Tehran had been hacked for years, their images encrypted and transmitted to servers in Tel Aviv and southern Israel, according to two people familiar with the matter.« www.ft.com/content/bf99...

02.03.2026 18:49 — 👍 152    🔁 57    💬 6    📌 11

Fast 400 IT-Wissenschaftler*innen aus 30 Ländern warnen vor #Altersverifizierung für Social Media.

".. we fear that, if implemented without careful consideration of the
technological hazards and societal impact, the new regulation might cause more harm than good."

#Social-Media-Verbot

02.03.2026 19:32 — 👍 129    🔁 51    💬 1    📌 4

Just last week the German government gutted the heating law which was supposed to drive a transition away from gas.

The timing could not have been worse: Gas prices are up 50% today and this crisis could worsen significantly. This will happen again and again and the consumer pays the price.

02.03.2026 16:16 — 👍 586    🔁 249    💬 19    📌 20
Preview
KI-Modelle enttarnen Online-Pseudonyme in Minuten ZÜRICH / LONDON (IT BOLTWISE) – Forschungen zeigen, dass KI-Modelle in der Lage sind, pseudonyme Internetnutzer schnell und kostengünstig zu identifizieren. Diese Entwicklung stellt grundlegende Annahmen über die Anonymität im Internet in Frage und könnte weitreichende Folgen für die Privatsphäre haben. Die jüngsten Forschungen von ETH Zürich und Anthropic haben gezeigt, dass kommerziell verfügbare KI-Modelle […] ... den vollständigen Artikel »KI-Modelle enttarnen Online-Pseudonyme in Minuten« lesen Dieser Beitrag KI-Modelle enttarnen Online-Pseudonyme in Minuten erschien als erstes auf IT BOLTWISE® x Artificial Intelligence.

KI-Modelle enttarnen Online-Pseudonyme in Minuten #cybersecurity #infosec

02.03.2026 18:30 — 👍 1    🔁 1    💬 0    📌 0
Preview
Hacktivists claim to have hacked Homeland Security to release ICE contract data | TechCrunch A hacking group called Department of Peace said they hacked a specific office within Homeland Security to protest ICE’s mass deportation campaign, and the companies aiding it.

NEW: A group of hacktivists calling themselves "Department of Peace" claims to have hacked an office wihin the Department of Homeland Security.

The hacktivists leaked data on more than 6,000 contracts between DHS/ICE and private companies to the transparency website Distributed Denial of Secrets.

02.03.2026 16:17 — 👍 43    🔁 23    💬 1    📌 2
Preview
Cyberangriffe auf Iran: Unbekannte Hacker senden Botschaften über Gebets-App TEHERAN / LONDON (IT BOLTWISE) – Inmitten eines militärischen Angriffs auf iranische Ziele erhielten Millionen Iraner unerwartete Benachrichtigungen über eine beliebte Gebets-App. Diese Nachrichten forderten zur Kapitulation auf und versprachen Amnestie, was die Spannungen in der Region weiter anheizt. In den frühen Morgenstunden eines Samstags wurden Iraner von einer ungewöhnlichen Serie von Push-Benachrichtigungen überrascht, die […] ... den vollständigen Artikel »Cyberangriffe auf Iran: Unbekannte Hacker senden Botschaften über Gebets-App« lesen Dieser Beitrag Cyberangriffe auf Iran: Unbekannte Hacker senden Botschaften über Gebets-App erschien als erstes auf IT BOLTWISE® x Artificial Intelligence.

Cyberangriffe auf Iran: Unbekannte Hacker senden Botschaften über Gebets-App #cybersecurity #infosec

02.03.2026 15:59 — 👍 1    🔁 0    💬 0    📌 0

Amateurs study tactics; professionals study logistics.

01.03.2026 16:13 — 👍 56    🔁 16    💬 0    📌 1

In war games the movie the #AI ultimately is smart enough to exit the game. Our current LLMs are not that smart…

27.02.2026 17:16 — 👍 3    🔁 0    💬 2    📌 0
Preview
Exclusive | Government Agencies Raise Alarm About Use of Elon Musk’s Grok Chatbot Warnings about xAI’s safety and reliability preceded the Pentagon’s decision to approve Grok for use in classified settings.

Duh

Government Agencies Raise Alarm About Use of Elon Musk’s Grok Chatbot (Gift article)
www.wsj.com/politics/nat...

27.02.2026 16:24 — 👍 2    🔁 3    💬 0    📌 0

Trump’s billionaire allies will now own CNN, Fox News, CBS, WaPo, WSJ and NY Post — plus 185+ local tv stations and news in 100 markets.

They also control X, Facebook, Instagram, Threads, WhatsApp, TikTok, Truth and Twitch.

This is all by design to manipulate and surveil us.

Pay attention.

27.02.2026 14:48 — 👍 2039    🔁 966    💬 110    📌 55
Preview
Trump, seeking executive power over elections, is urged to declare emergency Activists who say they are in coordination with the White House are circulating a draft executive order that would unlock extraordinary presidential power over voting.

Breaking WaPo:

Pro-Trump activists who say they are in coordination with the White House are circulating a 17-page draft executive order that claims China interfered in the 2020 election as a basis to declare a national emergency that would unlock extraordinary presidential power over voting.

26.02.2026 17:26 — 👍 2467    🔁 1230    💬 316    📌 390
Preview
Exclusive: US orders diplomats to fight data sovereignty initiatives An internal diplomatic cable said such efforts could interfere with AI-related services.

Ist das schon offene hybride Kriegführung?

Exclusive: US orders diplomats to fight data sovereignty initiatives

25.02.2026 15:06 — 👍 174    🔁 69    💬 14    📌 3
Preview
Meta Director of AI Safety Allows AI Agent to Accidentally Delete Her Inbox Meta Superintelligence Labs’ director of alignment called it a “rookie mistake.”

Accidentally 😂🤣

24.02.2026 01:01 — 👍 1    🔁 1    💬 0    📌 0
Preview
Putin can’t survive without war

In attempting to destroy Ukraine, Russia has turned itself into the land of the dead. My reflection on four years of war. unherd.com/2026/02/puti...

24.02.2026 05:43 — 👍 64    🔁 15    💬 1    📌 0

Ditched #windows11 for #bazzite on my gaming pc last week, which works amazing after a few tweaks. Currently testing #ZorinOS to replace my aging MacBook and so far it works great. Amazing how far #Linux has become in terms of usability + app support

23.02.2026 19:17 — 👍 2    🔁 0    💬 0    📌 0
The Tiktok Problem – A Study on Cognitive Warfare NATO defines cognitive warfare as a new unconventional form of hybrid warfare, where the human mind becomes the primary battleground. The goal is to manipulate not only what people think but also how they think and act. If successful, cognitive warfare can shape individual and collective beliefs to align with an aggressor’s strategic objectives. In extreme cases, it can fracture society, eroding the collective will to resist an adversary’s intentions. This form of warfare allows an opponent to subdue a population without direct force or coercion. In today’s world, where much of our lives unfold online, social networks create an illusion of social interaction while altering fundamental human behaviors. Digital platforms have reshaped entire generations, particularly those who grew up immersed in screens. Research now confirms the long-term effects of social media and mobile applications on human psychological health, brain development, attention span, and behavior. Social media addiction, particularly among children, is rising, exacerbating issues such as cyberbullying, online grooming, disinformation, and political radicalization. These vulnerabilities present an opportunity for adversaries to exploit digital platforms for large-scale psychological operations. TikTok, a short-video social media platform owned by China-based company ByteDance, has become one of the most popular apps among Generation Z (Gen Z), a generation immersed in digital technology, the internet, and social media from childhood. While widely used for entertainment and marketing, TikTok presents unique security and cognitive risks due to its ownership, data collection practices, and algorithmic influence.

The Tiktok Problem – A Study on Cognitive Warfare #cybersecurity #infosec

21.02.2026 15:58 — 👍 0    🔁 0    💬 0    📌 0
Preview
'Students Are Being Treated Like Guinea Pigs:' Inside an AI-Powered Private School Alpha School, an “AI-powered private school” that heavily relies on AI to teach students and can cost up to $65,000 a year, is AI-generating faulty lesson plans that internal company documentation find sometimes do “more harm than good,” and scraping data from a variety of other online courses without permission to train its own AI, according to former Alpha School employees and internal company documents. 

'Students Are Being Treated Like Guinea Pigs:' Inside an AI-Powered Private School #cybersecurity #infosec

21.02.2026 03:45 — 👍 0    🔁 0    💬 0    📌 0
Preview
European Parliament bars lawmakers from using AI tools Who knows where that helpful email summary is being generated? The European Parliament has reportedly turned off AI features on lawmakers' devices amid concerns about content going where it shouldn't.…

European Parliament bars lawmakers from using AI tools #cybersecurity #infosec

20.02.2026 23:11 — 👍 0    🔁 0    💬 0    📌 0