RandomAccessMusings's Avatar

RandomAccessMusings

@rndmamusings.bsky.social

CTI @ Volexity

74 Followers  |  133 Following  |  7 Posts  |  Joined: 12.07.2023  |  1.7058

Latest posts by rndmamusings.bsky.social on Bluesky

As one of the folks involved in this I can echo it wasn't super advanced at all, and some of the malware contained errors (double TLS header network coms). The challenge the LLM use introduced was quantity to keep on top of - thankfully it was simple enough we could write quick automations to triage

14.11.2025 17:09 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Ooops πŸ˜… #VTi

11.11.2025 16:04 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

It's not a revolutionary change, but it will have an impact that will drive more automation in response I think.

09.11.2025 10:29 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

It will increase the pace & variations in some operations, but at the cost of their quality/effectiveness. We observed an actor using it earlier this year & the nonsensical nature raised the opportunities for detection/prevention - but the quantity of it was definitely a challenge to be on top of

09.11.2025 10:29 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
A chart showing how well 13 different Android AV apps detect 17 stalkerware products.

A chart showing how well 13 different Android AV apps detect 17 stalkerware products.

EFF teamed up with AV Comparatives to see how well anti-virus apps detect stalkerware on Android phones.

www.eff.org/deeplinks/20...

06.11.2025 20:22 β€” πŸ‘ 124    πŸ” 44    πŸ’¬ 7    πŸ“Œ 3
Post image

@stevenadair.bsky.social is back again!

Founder + President of Volexity leading a team of experts that deal w/ complex cyber intrusions from nation-state level intruders. His talk will cover a Chinese APT actor that Volexity tracks as UTA0388.

Check out the official agenda:
cyberwarcon.com

15.10.2025 15:11 β€” πŸ‘ 2    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Preview
APT Meets GPT: Targeted Operations with Untamed LLMs Starting in June 2025, Volexity detected a series of spear phishing campaigns targeting several customers and their users in North America, Asia, and Europe. The initial observed campaigns were tailor...

This was an interesting one to work on! tldr: Chinese aligned actor uses LLM to empower their malware development, target gathering, and phishing operation. Goes wrong and starts randomly including pornographic material and other random files/info.

www.volexity.com/blog/2025/10...

08.10.2025 14:08 β€” πŸ‘ 5    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0
Preview
Go Get 'Em: Updates to Volexity Golang Tooling Volexity’s GoResolver tool was released in April 2025 to help with analysis of these samples, reducing analyst load when working with obfuscated Golang binaries. However, there are still some difficul...

@volexity.com has released updates to its #opensource GoResolver project and more! This work was part of a project for one of our #summerinternship students. Read more details about Volexity’s updated GoResolver projects + other #golang tools in our special blog post!

11.08.2025 19:05 β€” πŸ‘ 10    πŸ” 10    πŸ’¬ 1    πŸ“Œ 0

This training course will be led by Andrew Case @attrc.bsky.social, Michael Ligh & Dave Lassalle. This is a great opportunity to gain valuable knowledge about #Volatility3 + learn all about #memoryforensics from Volatility core developers! Seats are filling up quickly so don't wait!

09.07.2025 20:54 β€” πŸ‘ 6    πŸ” 8    πŸ’¬ 0    πŸ“Œ 0
Preview
CitrixBleed 2 exploitation started mid-Juneβ€Šβ€”β€Šhow to spot it CitrixBleed 2β€Šβ€”β€ŠCVE-2025–5777β€Šβ€”β€Šhas been under active exploitation to hijack Netscaler sessions, bypassing MFA, globally for a month.

New by me - although Citrix say there is no evidence of exploitation of CitrixBleed 2 vulnerability, they are wrong - it has been under active exploitation since mid June by an IP associated to a ransomware group, with multiple IP addresses now involved.

doublepulsar.com/citrixbleed-...

08.07.2025 14:46 β€” πŸ‘ 81    πŸ” 35    πŸ’¬ 4    πŸ“Œ 0

It can tell you some forensic artifacts that can exist due to execution (e.g. for .NET) and it can also tell you what possible systems it can run on in the environment you're investigating.

For clarity this isn't an argument that inclusion of this is right in reporting, other info could be better.

14.05.2025 19:50 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows Since early March 2025, Volexity has observed multiple suspected Russian threat actors conducting highly targeted social engineering operations aimed at gaining access to the Microsoft 365 (M365) acco...

@volexity.com #threatintel: Multiple Russian threat actors are using Signal, WhatsApp & a compromised Ukrainian gov email address to impersonate EU officials. These phishing attacks abuse 1st-party Microsoft Entra apps + OAuth to compromise targets.

www.volexity.com/blog/2025/04...

#dfir

22.04.2025 16:39 β€” πŸ‘ 18    πŸ” 12    πŸ’¬ 0    πŸ“Œ 1
BADBAZAAR and MOONSHINE: Spyware targeting Uyghur, Taiwanese and Tibetan groups and civil society actors

BADBAZAAR and MOONSHINE: Spyware targeting Uyghur, Taiwanese and Tibetan groups and civil society actors

The NCSC and partners have revealed new details about how malicious cyber actors are using two forms of spyware to target individuals in Uyghur, Tibetan and Taiwanese communities as well as civil society groups.
www.ncsc.gov.uk/news/ncsc-pa...

09.04.2025 08:25 β€” πŸ‘ 14    πŸ” 14    πŸ’¬ 1    πŸ“Œ 0
Post image

tired of looking at email headers as disgusting plaintext? only want things of value to stand out?

look no further than this VSCode extension built by @jacoblatonis.me

marketplace.visualstudio.com/items?itemNa...

21.03.2025 20:02 β€” πŸ‘ 21    πŸ” 6    πŸ’¬ 2    πŸ“Œ 1

"It is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware."

With the amount of Next.js-based sites around, especially on infosec sites, I'd say this looks like a problem.

CVSS: 9.1

github.com/vercel/next....

21.03.2025 21:48 β€” πŸ‘ 23    πŸ” 9    πŸ’¬ 1    πŸ“Œ 1

We have been tracking multiple Russian APT groups aggressively targeting organizations with Microsoft Device Code authentication phishing. The attackers got creative with tricking users into granting them access to their accounts. Have a look at our blog for all the details!

14.02.2025 01:31 β€” πŸ‘ 15    πŸ” 7    πŸ’¬ 0    πŸ“Œ 1
Preview
Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication Starting in mid-January 2025, Volexity identified several social-engineering and spear-phishing campaigns by Russian threat actors aimed at compromising Microsoft 365 (M365) accounts. These attack cam...

@volexity.com recently identified multiple Russian threat actors targeting users via #socialengineering + #spearphishing campaigns with Microsoft 365 Device Code authentication (a well-known technique) with alarming success: www.volexity.com/blog/2025/02...

#dfir #threatintel #m365security

13.02.2025 22:39 β€” πŸ‘ 35    πŸ” 20    πŸ’¬ 2    πŸ“Œ 7
Video thumbnail

CTI is the cause of my brainrot but I really cooked on this #salttyphoon #telecomhack

26.11.2024 22:18 β€” πŸ‘ 49    πŸ” 18    πŸ’¬ 5    πŸ“Œ 3
Preview
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA In July 2024, Volexity identified exploitation of a zero-day credential disclosure vulnerability in Fortinet’s Windows VPN client that allowed credentials to be stolen from the memory of the client’s ...

@volexity.bsky.social has published a blog post detailing variants of LIGHTSPY & DEEPDATA malware discovered in the summer of 2024, including exploitation of a vulnerability in FortiClient to extract credentials from memory. Read more here: www.volexity.com/blog/2024/11...

15.11.2024 20:02 β€” πŸ‘ 37    πŸ” 27    πŸ’¬ 0    πŸ“Œ 1
Preview
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA In July 2024, Volexity identified exploitation of a zero-day credential disclosure vulnerability in Fortinet’s Windows VPN client that allowed credentials to be stolen from the memory of the client’s ...

www.volexity.com/blog/2024/11...

Key:
- Unpatched credential disclosure 0day in VPN client that's actively exploited in the wild
- Volexity assesses with medium confidence that BrazenBamboo is a private enterprise that produces capabilities for governmental operators concerned with domestic targets

15.11.2024 20:46 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

@rndmamusings is following 20 prominent accounts