Matt Johansen's Avatar

Matt Johansen

@mattjay.com.bsky.social

Friendly neighborhood cybersecurity guy | expect infosec news, appsec, cloud, dfir. | Long Island elder emo in ATX. vulnu.com <- sign up for my weekly cybersecurity newsletter

9,742 Followers  |  481 Following  |  794 Posts  |  Joined: 23.04.2023  |  1.6631

Latest posts by mattjay.com on Bluesky

Post image

This is a fun vuln

youtu.be/jsygONOr_f4

31.07.2025 21:58 β€” πŸ‘ 6    πŸ” 1    πŸ’¬ 0    πŸ“Œ 1
Preview
Vulnerable U Infosec's favorite weekly newsletter for news, tools, and tips with 28,000+ CISOs, founders, change-makers, and straight up hackers.

If you like following news like this checkout my weekly newsletter:

Join over 30k pros: vulnu.com/subscribe

25.07.2025 20:27 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Not just 4chan trolls. 404media decompiled the app and found the URLs in question in code. Not public anymore, but verified they are there.

Original article: www.404media.co/wome...

25.07.2025 20:27 β€” πŸ‘ 8    πŸ” 0    πŸ’¬ 2    πŸ“Œ 1
Post image

"No authentication, no nothing. It's a public bucket"

This is why security and privacy pros hate these ID verification laws that require drivers license uploads - these apps just can't keep this stuff secure.

25.07.2025 20:27 β€” πŸ‘ 7    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

They found the database exposed on Google's Firebase.

The app is meant to be basically the "are we dating the same man?" Facebook group in a dating app.

In order to verify that the users are women, they ask for photos and driver's licenses.

25.07.2025 20:27 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

That viral women's only dating app 'Tea' was hacked by some 4chan users.

They didn't phish, social engineer, or use some crazy hacker technique either - the database was just public

25.07.2025 20:27 β€” πŸ‘ 9    πŸ” 3    πŸ’¬ 2    πŸ“Œ 0
Post image

Hey so… don’t do this.

25.07.2025 17:25 β€” πŸ‘ 14    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

Someone can buy this extension that is tied to tons of peole's salesforce account and just ...get access to all that info. (h/t @johntuckner.me)

16.07.2025 23:55 β€” πŸ‘ 8    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

If I was a bad guy who was looking for memory vulns, I'd be ALL OVER these new hotness web browsers. (Comet, Arc, etc.)

Market share is small but much more valuable targets. - Teams behind them way smaller than ...Google

15.07.2025 19:09 β€” πŸ‘ 11    πŸ” 3    πŸ’¬ 2    πŸ“Œ 0
Post image

Wild trend this week of legitimate apps and extensions turning into malware.

youtu.be/o9XBXeX0_5E

11.07.2025 18:19 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

I just can't believe how successful ClickFix campaigns are right now.

And now FileFix on top of it...

10.07.2025 14:20 β€” πŸ‘ 7    πŸ” 0    πŸ’¬ 1    πŸ“Œ 1
Lift me up to Ring 0: what are the most vulnerable Windows drivers Examining the statistics on the most frequently patched Windows drivers between January 2022 and May 2025

Volume of vulns != In The Wild exploits.

Super interesting post and data - aibaranov.github.io/windrivers/

06.07.2025 22:40 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image Post image

Which Windows drivers keep Microsoft’s security engineers busiest - and which ones do attackers actually exploit?

Artem Baranov did the dang math.

He scraped every CVE bulletin from Jan 2022 through May 2025 and built a clean data set of kernel-mode driver patches.

06.07.2025 22:40 β€” πŸ‘ 12    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Preview
Vulnerable U Infosec's favorite weekly newsletter for news, tools, and tips with 28,000+ CISOs, founders, change-makers, and straight up hackers.

If you like staying on top of this kind of news:

Join over 30,000 cybersecurity pros who get my free weekly newsletter - vulnu.com/subscribe

03.07.2025 17:19 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
macOS NimDoor | DPRK Threat Actors Target Web3 and Crypto Platforms with Nim-Based Malware NimDoor reflects a leap in DPRK’s offensive toolkit, mixing compile-time trickery with native scripting to complicate and deter analysis.

[1]: www.sentinelone.com/... "macOS NimDoor | DPRK Threat Actors Target Web3 and Crypto Platforms with Nim-Based Malware | SentinelOne"

[2]: www.securityweek.com... "North Korean Hackers Use Fake Zoom Updates to Install macOSΒ Malware - SecurityWeek"

03.07.2025 17:19 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

macOS isn’t safe just because of Gatekeeper

social-engineering + obscure languages (Nim) = new blind spots.

Patch, monitor WebSocket egress, & warn employees: *no legit Zoom update arrives as an AppleScript!*

RT to keep teams safe.

03.07.2025 17:19 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image Post image

The data exfiltration:

Keychain creds, browser data, Telegram chats, then push over WebSockets - encrypted channel, tricky for network sensors that ignore non-HTTP(S) traffic

03.07.2025 17:18 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

Nasty little persistence trick - malware revives itself when killed.
It intercepts `SIGINT` / `SIGTERM`, then rewrites LaunchAgents on shutdown.

"any user-initiated termination of the malware results in the deployment of the core components, making the code resilient to basic defensive actions."

03.07.2025 17:18 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

Stage-2 drops two binaries in /private/var/tmp

β€’ `a` (C++) - kicks off data-stealing chain
β€’ `installer` (Nim) - sets up persistence via signal handlers so killing the process re-installs the backdoor on reboot.

03.07.2025 17:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

That script (`zoom_sdk_support.scpt`) hides *10,000 blank lines* scroll forever, never see the payload.

The last 3 lines fetch stage-2 from `support.us05web-zoom[.]forum` (notice the look-alike Zoom domain)

03.07.2025 17:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

The attacker pretends to be a trusted contact β†’ DM on Telegram β†’ Calendly invite β†’ follow-up email with a Zoom link that tells victims to β€œrun this update script.”

It's been hyper successful and catching founders/devs off-guard

03.07.2025 17:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

🚨 New macOS backdoor alert: North-Korean hackers are disguising a Zoom update that drops malware built to hijack laptops and steal data & passwords.

If you or your devs run macOS, keep scrolling.πŸ‘‡

03.07.2025 17:18 β€” πŸ‘ 8    πŸ” 6    πŸ’¬ 2    πŸ“Œ 0
Preview
Vulnerable U Infosec's favorite weekly newsletter for news, tools, and tips with 28,000+ CISOs, founders, change-makers, and straight up hackers.

If you like this kind of news - join over 30,000 pros who get my free weekly cybersecurity newsletter:

vulnu.com/subscribe

02.07.2025 18:36 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations | Microsoft Security Blog Since 2024, Microsoft Threat Intelligence has observed remote IT workers deployed by North Korea leveraging AI to improve the scale and sophistication of their operations, steal data, and generate revenue for the North Korean government.

Check the whole report for more things to watch out for and how to protect yourself:

www.microsoft.com/en...

02.07.2025 18:36 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 2    πŸ“Œ 0
Post image

One of the wilder revelations in this report for me: They're hiring facilitators that are managing the scheme in the US.

They also:
- Create a bank account for the North Korean, or lend their own account to the worker
- Purchase mobile phone numbers or SIM cards


02.07.2025 18:36 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

But they create a big digital footprint and work history. This helps with legitimacy and some light background checks.

A bunch of them have GitHub profiles full of activity and badges.

02.07.2025 18:36 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image Post image

They've gotten real good at making fake profiles, pictures, resumes on LinkedIn and even boosting their resumes.

This is the heaviest use of AI we've seen.

02.07.2025 18:36 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

"To evade detection, these workers use VPNs, virtual private servers (VPSs), and proxy services as well as RMM tools to connect to a device housed at a facilitator’s laptop farm located in the country of the job."

02.07.2025 18:36 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

Even the DoJ just put out how they're busting these laptop farms facilitating these remote workers access to US companies.

29 houses raided recently

02.07.2025 18:35 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

A lot of people are waiting for the "super AI malware hacking machine!" to drop, but really it's just how everyone is using AI.

Either way, it's been hyper successful for them. Hundreds of companies have hired these spies unwittingly.

02.07.2025 18:35 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

@mattjay.com is following 20 prominent accounts