Illusory Wishes: China-nexus APT Targets the Tibetan Community | www.zscaler.com/blogs/securi... @zscalerinc.bsky.social
24.07.2025 12:07 β π 2 π 1 π¬ 0 π 0@xorhex.bsky.social
Illusory Wishes: China-nexus APT Targets the Tibetan Community | www.zscaler.com/blogs/securi... @zscalerinc.bsky.social
24.07.2025 12:07 β π 2 π 1 π¬ 0 π 0How did China's top APT hackers come to be? Many were early "Honkers" - patriotic hackers who in late 90s launched low-skill cyberattacks against nations deemed disrespectful to China. But once Honkers developed their skills, PLA/MSS came calling. Based on great research by bsky.app/profile/eube...
18.07.2025 15:48 β π 58 π 30 π¬ 0 π 1The workshop tickets for my Advanced Ghidra Scripting & Automation workshop at @defcon.bsky.social are live now: events.humanitix.com/dc33ws-n260-...
16.07.2025 11:48 β π 0 π 1 π¬ 0 π 0Signed up! The inaugural conference was great - looking forward to the next one π
14.07.2025 16:48 β π 1 π 1 π¬ 0 π 0Had a great time on the @malspace.bsky.social podcast with Julien talking about my PIVOTcon presentation from tracking compartmentalized attacks to thoughts on attribution. Fun convo (and I loved the theme song at the end!). πΆ Thanks for having me!
malspace.com/episodes/mul...
We've uploaded our Time Travel Debugging in Binary Ninja stream with Xusheng Li from Vector 35
where we unpacked malware and analyzed anti-analysis capabilities with TTD traces. Enjoy! youtu.be/2v7DRyXb8_c
A side by side comparison of the original output by Ghidra, and the LLM enriched output.
Ghidra, scripting, LLM, automagic automation. That should grab the attention for this thread. If you want to read the complete blog, you can do so here: www.trellix.com/blogs/resear...
1/n
In case you missed it, check out the βSupper is servedβ technical blog by cyberj3rry on the Supper backdoor c-b.io/2025-06-29+-... itβs well written and provides a great overview of its functionality!
06.07.2025 13:36 β π 1 π 1 π¬ 0 π 0#mlget has been updated to work with Malware Bazaarβs new Auth requirement!
github.com/xorhex/mlget...
The slides from our @reconmtl.bsky.social talk, "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" (CC @nicolo.dev ), are now online!
Slides: synthesis.to/presentation...
Plugin: github.com/mrphrazer/ob...
Announcing RE//verse 2026! Website is updated with info for sponsors, trainers, speakers, and more importantly, attendees! Are you ready for another year of high quality reverse engineering talks and networking? Join us the first week of March, 2026!
re-verse.io
I know I've been slacking on contributing to YARA-X, but I've been busy elsewhere. I do run a small keybase group where developers and users hang out. Ideas, features and bugs are discussed there. If you think you would benefit from being part of the discussion just hit me up for an invite.
26.06.2025 14:01 β π 4 π 1 π¬ 0 π 0Fun crossover blog about TA829 (RomCom) & TransferLoader with my ecrime pals @selenalarson.bsky.social itβs got it all:
π°οΈ Popped routers for sending phish
π ACH on attribution
πΎ custom protocols
π½ cool malware
π΅οΈ crime
π― espionage
βmany unanswered questions
www.proofpoint.com/us/blog/thre...
Matt Pahl and I are doing a webinar on defining ICS Malware, its distinction from IT threats, and how we search for it using different OT detection strategies. It's a follow-up to the ICS Malware definition work. Hope to see you there!
Registration link:
hub.dragos.com/webin...
Busy Week!
Grateful to SANS ICS for hosting my talk on ICS Malware. It was a great experience.
We released our whitepaper on the subject ( www.dragos.com/resou... ).
We also got word that my talk with Sam Hanson on assessing ICS threats was accepted at Defcon ICS village. Hope to see you there!
Suspicious domains awsonlineserch[.]com and azuronlineserch[.]com were co-registered through Njalla on 6/19/25. Currently resolving to 34.204.12[.]191 and 20.83.167[.]25, respectively.
20.06.2025 17:58 β π 1 π 1 π¬ 1 π 0excited bc today @huntress.com is releasing our analysis of a gnarly intrusion into a web3 company by the DPRK's BlueNoroff!! π€
we've observed 8 new pieces of macOS malware from implants to infostealers! and they're actually good (for once)!
www.huntress.com/blog/inside-...
There are currently two roles open at Insikt Group, one Senior Analyst focused on Iran and one Analyst focused on Rest of the World. Reach out if you have questions:
job-boards.greenhouse.io/recordedfutu...
job-boards.greenhouse.io/recordedfutu...
We've been working on this one for a while, so I'm excited to finally share our whitepaper on defining ICS Malware. In it, we describe how Dragos identifies and differentiates ICS Malware using three properties: ICS-capability, Malicious Intent, and Adverse Effects.
http://www.dragos.co...
I'm thrilled to be speaking at #VB2025 this September in Berlin! My talk will focus on TAG-124, a widespread traffic distribution system, and its role in the cybercriminal ecosystem, with a particular emphasis on its link to ransomware operations! π tinyurl.com/3hurr52m
16.06.2025 07:14 β π 20 π 5 π¬ 0 π 0Today we are releasing a report on new infrastructure and tooling linked to GrayAlpha, a financially motivated threat actor overlapping with FIN7 π§΅
www.recordedfuture.com/research/gra...
Forgot to mention this the other week - capa v9.2.0/v9.2.1 has been released! This version includes the rules I wrote for detecting COM-based assembly loading and donut shellcode/relevant feature detection.
github.com/mandiant/cap...
Today weβre publishing new findings on Predator spyware, still active despite global sanctions, now with a new client and ties to a Czech entity. Hereβs what we found π§΅
www.recordedfuture.com/research/pre...
Hi, Iβm the author of mlget (bsky.app/profile/xorh...) - is it possible to DM you? Iβve a question about the API response when a file is returned versus when itβs not found.
12.06.2025 15:20 β π 1 π 0 π¬ 1 π 0VxShareβs API is currently returning a 500
12.06.2025 00:03 β π 0 π 0 π¬ 0 π 0Latest test run: For the ones that failed, I either donβt have a current API key to test with or an instance of the service to test against. If folks can test and let me know, Iβd be very grateful! Please submit an issue in GitHub if itβs broken. Thanks! π
#mlget has been updated - your 1 stop shop for finding malware across different services!
Grab an updated copy at github.com/xorhex/mlget...
Happy to add additional services if folks know of more!
Some services I no longer have access to for testing - see the Alt text for more info.
Was great presenting with @milenkowski.bsky.social at @haguetix.bsky.social yesterday. Big thank you for hosting this incredible event. Looking forward to next year!
11.06.2025 16:53 β π 8 π 3 π¬ 0 π 0New #TinyTracer (v3.0) is out - with many cool features: github.com/hasherezade/... - check them out!
06.06.2025 19:11 β π 15 π 6 π¬ 1 π 0Apparently my lightning talk at @cyberwarcon.bsky.social last year was released. Go watch it for a quick overview. COLDRIVER is still active, and still evolving to this day.
The critical question is do I want to use emojis when I post about them?
picture
Really excited to see this research go live. We found 400 web based HMIs for US Water facilities open on Censys. With the EPA, we helped reduced that exposure by over 94%.
https://censys.com/blog/turning-off-the-information-flow-working-with-the-epa-to-secure-hundreds-of-exposed-water-hmis