pip0's Avatar

pip0

@pipzero.bsky.social

Information security practitioner. All things cti collection.

219 Followers  |  231 Following  |  7 Posts  |  Joined: 18.11.2024  |  1.6026

Latest posts by pipzero.bsky.social on Bluesky

Post image Post image

I have created a website, where you can share your sample analysis (via links or posts) and search samples for training based on tags and difficulty.

If you write analysis blogs, you can share them there.
samplepedia.cc

04.01.2026 05:53 β€” πŸ‘ 14    πŸ” 7    πŸ’¬ 0    πŸ“Œ 1
Post image

You can now pull Ghidra databases straight into your workflow in Binary Ninja 5.2! Open a .gbf on its own, import Ghidra data into an existing session, or bring parts of a full project into a Binary Ninja project on Commercial and above.

25.11.2025 21:30 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Post image

Members of Gen Digital Threat Labs uncover two new DPRK toolsets - Kimsuky’s HttpTroy backdoor and Lazarus’s upgraded BLINDINGCAN remote access tool - and explain how these tools work. www.gendigital.com/blog/insight...

03.11.2025 12:11 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
The obfuscation game: MUT-9332 targets Solidity developers via malicious VS Code extensions | Datadog Security Labs Analysis of a threat actor campaign targeting Solidity developers via three malicious VS Code extensions

🚨 The obfuscation game: MUT-9332 targets Solidity developers via malicious VS Code extensions!

Deep dive analysis in this obfuscated campaign including (PowerShell & VBS scripts, PE malware, Malicious browser extensions even stegomalware)

Enjoy reading securitylabs.datadoghq.com/articles/mut...

21.05.2025 12:10 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

Leaving SF right in time before all the AI diarrhea. Thank you Hack The Bay and Pacific Hackers for having me, I’ll be back next year.

29.04.2025 03:19 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Catch me speaking intelligence collection at scale today at HackTheBay #PHACK

28.04.2025 20:07 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Diagram showing an overview of the OUTLAW infection chain.

Diagram showing an overview of the OUTLAW infection chain.

Elastic Security Labs researchers report on Outlaw, a persistent yet unsophisticated auto-propagating Linux coinminer. Despite lacking stealth and advanced evasion techniques, it remains active and effective by leveraging simple but impactful tactics. www.elastic.co/security-lab...

02.04.2025 12:18 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
How to Enter the US With Your Digital Privacy Intact Crossing into the United States has become increasingly dangerous for digital privacy. Here are a few steps you can take to minimize the risk of Customs and Border Patrol accessing your data.

Green card holders detained. A French researcher denied entry for anti-Trump messages. A new travel ban on 40+ countries coming.

Given all these encroachments on travelers' civil liberties, we've updated our guide to digital privacy while crossing US borders. www.wired.com/2017/02/guid...

24.03.2025 18:29 β€” πŸ‘ 984    πŸ” 500    πŸ’¬ 26    πŸ“Œ 43
Graphic showing relations between Moonstone Sleet and other subgroups

Graphic showing relations between Moonstone Sleet and other subgroups

JPCERT/CC's δ½γ€…ζœ¨ 勇人 (Hayato Sasaki) looks into the practical challenges of attribution in the case of Lazarus’s subgroup. blogs.jpcert.or.jp/en/2025/03/c...

25.03.2025 13:58 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Both Wiz and Palo Alto Networks have found evidence that the compromise of the Changed-Files GitHub Action might have been a complex multi-tier supply chain attack targeting tools used by Coinbase developers

www.wiz.io/blog/new-git...

unit42.paloaltonetworks.com/github-actio...

23.03.2025 12:27 β€” πŸ‘ 23    πŸ” 5    πŸ’¬ 0    πŸ“Œ 1
Preview
GitHub - Zouuup/landrun: Run any Linux process in a secure, unprivileged sandbox using Landlock LSM. Think firejail, but lightweight, user-friendly, and baked into the kernel. Run any Linux process in a secure, unprivileged sandbox using Landlock LSM. Think firejail, but lightweight, user-friendly, and baked into the kernel. - Zouuup/landrun

AI and blockchain software expert Armin Ranjbar released Landrun, a lightweight, secure sandbox for running Linux processes

github.com/Zouuup/landrun

23.03.2025 14:00 β€” πŸ‘ 12    πŸ” 4    πŸ’¬ 1    πŸ“Œ 0
Preview
GitHub - Cryakl/Ultimate-RAT-Collection: For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots. For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots. - Cryakl/Ultimate-RAT-Collection

Someone has done an excellent job collecting RATs and documenting them by version. They also included images.

A+ work. This is amazing (we're going to ingest this eventually)

github.com/Cryakl/Ultim...

22.03.2025 17:25 β€” πŸ‘ 45    πŸ” 17    πŸ’¬ 0    πŸ“Œ 1
Post image

⚠️🧡 RL researchers have found 2 malicious #VSCode extensions, "ahban.shiba" & "ahban.cychelloworld," that deliver #ransomware in development to it's users. #Dev #SoftwareSupplyChainSecurity

19.03.2025 13:46 β€” πŸ‘ 8    πŸ” 9    πŸ’¬ 1    πŸ“Œ 0
Post image

Just over 600 GitHub repos were impacted by Changed-Files supply chain attack

www.endorlabs.com/learn/blast-...

20.03.2025 00:04 β€” πŸ‘ 7    πŸ” 3    πŸ’¬ 0    πŸ“Œ 1
Post image

Podcast: risky.biz/RBNEWS400/ (400, woohoo! πŸŽ‰)
Newsletter: risky.biz/risky-bullet...

-China says Taiwan's military is behind PoisonIvy APT
-Google buys Wiz for $32 billion
-11 APTs abuse a Windows zero-day
-Judge tells CISA to reinstate fired workers
-Supply-chain attack hits car dealership sites

19.03.2025 09:23 β€” πŸ‘ 20    πŸ” 9    πŸ’¬ 3    πŸ“Œ 0
Preview
EFF Border Search Pocket Guide border-pocket-guide-2.pdf

If you're critical of the US government and you are planning to cross the US border any time soon, today is a good day to review EFF's border search pocket guide: www.eff.org/document/eff...

19.03.2025 19:46 β€” πŸ‘ 2354    πŸ” 1443    πŸ’¬ 66    πŸ“Œ 73
Post image

-43% of WP vulns last year didn't require authentication to exploit
-96% of WP vulns impacted plugins
-22 new WP vulns published daily
-over 500k WP websites hacked last year

patchstack.com/whitepaper/s...

17.03.2025 23:43 β€” πŸ‘ 12    πŸ” 10    πŸ’¬ 3    πŸ“Œ 1
MalChela – A YARA and Malware Analysis Toolkit written inΒ Rust Saturday was for Python. Sunday was for Rust. After my success with the Python + YARA + Hashing, I decided to take things to the next level. Over the past few years I've created a number of Python and PowerShell scripts related to YARA and Malware Analysis. What if I combined them into a single utility? While we're at it, let's rewrite them all from scratch in Rust.

Introducing MalChela. A YARA and Malware Analysis utility written in Rust. #DFIR #MalwareAnalysis #YARA #Hashing

03.03.2025 20:10 β€” πŸ‘ 7    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
An inside look at NSA (Equation Group) TTPs from China’s lense

Xintra founder Lina Lau has published a report that untangles and puts more clarity on how Chinese authorities claim the Equation Group (US NSA) hacked the Xi'an Northwestern Polytechnical University

www.inversecos.com/2025/02/an-i...

19.02.2025 21:25 β€” πŸ‘ 12    πŸ” 8    πŸ’¬ 0    πŸ“Œ 1
Sun Security Con SunSecCon

Agenda for SunSecCon is up www.sunseccon.org

05.02.2025 22:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Datadog threat roundup: top insights for Q4 2024 | Datadog Security Labs Threat insights from Datadog Security Labs for Q4 2024.

Threat insights from Datadog Security Labs for Q4 2024

securitylabs.datadoghq.com/articles/202...

28.01.2025 15:14 β€” πŸ‘ 5    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Post image

Elastic Security Labs' Remco Sprooten & Ruben Groenewoud analyse PUMAKIT, a loadable kernel module (LKM) rootkit that employs advanced stealth mechanisms to hide its presence and maintain communication with command-and-control servers. www.elastic.co/security-lab...

20.01.2025 10:31 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Link? If you can.

08.01.2025 02:10 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Overview of the attack flow

Overview of the attack flow

Overview of how a large number of credentials were leaked

Overview of how a large number of credentials were leaked

Clusters of fake GitHub profiles

Clusters of fake GitHub profiles

Phishing e-mail

Phishing e-mail

New research: We've been monitoring a threat actor publishing dozens of trojanized GitHub repositories targeting threat actors, leaking hundreds of thousands of credentials along the way

securitylabs.datadoghq.com/articles/mut...

16.12.2024 13:08 β€” πŸ‘ 21    πŸ” 13    πŸ’¬ 0    πŸ“Œ 0
Preview
Introducing Supply-Chain Firewall: Protecting Developers from Malicious Open Source Packages | Datadog Security Labs Release of Supply-Chain Firewall, an open source tool for preventing the installation of malicious PyPI and npm packages

We are happy to introduce our latest tool "Supply Chain Firewall" πŸŽ‰ by @ikretz.bsky.social
The tool detects & prevents installation of malicious packages in local development environment.

Read more
securitylabs.datadoghq.com/articles/int...

And give it a try github.com/DataDog/supp...

06.12.2024 12:19 β€” πŸ‘ 11    πŸ” 7    πŸ’¬ 0    πŸ“Œ 0
Post image

Mistakes happen to everyone!

❀️ @binaryninja.bsky.social

06.12.2024 03:57 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Exclusive: The backdoor inserted in v1.95.7 adds an "addToQueue" function which exfiltrates the private key through seemingly-legitimate CloudFlare headers.

Calls to this function are then inserted in various places that (legitimately) access the private key.

03.12.2024 23:47 β€” πŸ‘ 49    πŸ” 32    πŸ’¬ 3    πŸ“Œ 2
Preview
Supply Chain Attack Detected in @solana/web3.js Library - So... A supply chain attack has been detected in versions 1.95.6 and 1.95.7 of the popular @solana/web3.js library.

🚨 A supply chain attack has been detected in versions 1.95.6 and 1.95.7 of the popular #Solana web3.js library. The injected code captures private keys and transmits them to a hardcoded address. This is a developing story. socket.dev/blog/supply-... #crypto #cybersecurity

03.12.2024 22:10 β€” πŸ‘ 14    πŸ” 8    πŸ’¬ 0    πŸ“Œ 3
Sun Security Con SunSecCon

PHACK, some friends and I are creating a Security track in the famous SCALE in LA (Pasadena). CFP is open and early birds tickets are for sale!

If your in LA come check us out! www.sunseccon.org www.phack.org www.socallinuxexpo.org/scale/22x

@socallinuxexpo.bsky.social #infosec

02.12.2024 17:53 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Sites that don’t let you copy/paste in the password field.

Let me try to type this 24 char (because the site doesn’t allow longer) randomly generated string.

Fail.

Reset password.

Let’s trying again…

27.11.2024 22:01 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@pipzero is following 19 prominent accounts