Sudheer Varma's Avatar

Sudheer Varma

@pwnisher.bsky.social

https://twitter.com/0xpwnisher Red Team at Amazon

186 Followers  |  101 Following  |  3 Posts  |  Joined: 01.11.2024  |  1.5222

Latest posts by pwnisher.bsky.social on Bluesky

It sure is!

16.03.2025 18:07 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Inside a New OT/IoT Cyberweapon: IOCONTROL Team82 obtained a sample of a custom-built IoT/OT malware called IOCONTROL used by the Iran-affiliated attackers to attack Israel- and U.S.-based OT/IoT devices.

Inside a New OT/IoT Cyberweapon: IOCONTROL

13.12.2024 07:00 โ€” ๐Ÿ‘ 3    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever w...

Excited that we @volexity.com are able to share a writeup of one of our most interesting incidents! This case involves:

* A 0-day exploit
* Physical trips to the customer site to determine root cause
* Compromise via Wi-Fi.

www.volexity.com/blog/2024/11...

#nearestneighbor #threatintel

22.11.2024 15:05 โ€” ๐Ÿ‘ 46    ๐Ÿ” 17    ๐Ÿ’ฌ 3    ๐Ÿ“Œ 0
Preview
Unveiling WolfsBane: Gelsemiumโ€™s Linux counterpart to Gelsevirine ESET researchers analyzed previously unknown Linux backdoors that are connected to known Windows malware used by the China-aligned Gelsemium group, as well as to Project Wood.

#ESET research has identified #Linux malware samples, one of which we named #WolfsBane and attribute with high confidence to #Gelsemium. This ๐Ÿ‡จ๐Ÿ‡ณ China-aligned APT group, active since 2014, has not previously been publicly reported to use Linux malware. www.welivesecurity.com/en/eset-rese... ๐Ÿงต(1/6)

21.11.2024 10:30 โ€” ๐Ÿ‘ 21    ๐Ÿ” 12    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 2
Preview
Anyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany More than 3 billion phone coordinates collected by a US data broker expose the detailed movements of US military and intelligence workers in Germanyโ€”and the Pentagon is powerless to stop it.

WIRED has tracked thousands of US military & intel personnel coming & going from classified sites, incl. NSA hubs & nuclear vaults. We know where they sleep, what they eat, and which brothels they visit.

It's an ocean of blackmail & national secrets within reach of every spy agency in the world.

20.11.2024 04:00 โ€” ๐Ÿ‘ 4222    ๐Ÿ” 1726    ๐Ÿ’ฌ 160    ๐Ÿ“Œ 257

Post a pic YOU took to bring some zen to the timeline.

18.11.2024 11:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Reverse Engineering iOS 18 Inactivity Reboot Wireless and firmware hacking, PhD life, Technology

How does the new iOS inactivity reboot work? What does it protect from?

I reverse engineered the kernel extension and the secure enclave processor, where this feature is implemented.

naehrdine.blogspot.com/2024/11/reve...

17.11.2024 21:42 โ€” ๐Ÿ‘ 280    ๐Ÿ” 107    ๐Ÿ’ฌ 12    ๐Ÿ“Œ 11

What sample is that on your IDA

09.11.2024 23:02 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar From repeatedly crippling thousands of gas stations to setting a steel mill on fire, Predatory Sparrowโ€™s offensive hacking has now targeted Iranians with some of history's most aggressive cyberattac...

Israel-linked hacker group Predatory Sparrow has carried out some of the most disruptive hacking of civilian targets ever. Yet they also claim to limit their cyberattacks' harm. I dug into the recent history of this hyper-aggressive, contradictory player in cyberwar.

www.wired.com/story/predat...

25.01.2024 15:00 โ€” ๐Ÿ‘ 6    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 2
Preview
The Sophos kernel implant, 'hack-back' implications, CIA malware in Venezuela - Security Conversations Three Buddy Problem โ€“ Episode 19: We explore Ivan Kwiatkowskiโ€™s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, [โ€ฆ]

The Three Buddy Problem podcast Episode 19 just published! We explore Ivan Kwiatkowskiโ€™s essay on the limits of threat intel, Sophos using kernel implants to surveil Chinese hackers, the concept of โ€˜hack-backโ€™, geopolitical layers of cyber espionage&more: securityconversations.com/episode/the-...

03.11.2024 19:24 โ€” ๐Ÿ‘ 2    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

Sophos engineers preparing their revenge against the Chengdu hackers #PacificRim

01.11.2024 10:29 โ€” ๐Ÿ‘ 16    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@pwnisher is following 19 prominent accounts