Antonio Pirozzi (@_antoniopirozzi) 's Twitter Profile
Antonio Pirozzi

@_antoniopirozzi

Threat Intelligence Lead @SentinelOne / PhD. Tweets and opinions are my own.

ID: 735098731440316416

calendar_today24-05-2016 13:22:49

752 Tweet

778 Followers

668 Following

SentinelOne (@sentinelone) 's Twitter Profile Photo

✨New on #SentinelLabs! Black Basta operational #TTPs revealing new tools and techniques and a link to FIN7. By Antonio Cocomazzi and Antonio Pirozzi. sentinelone.com/labs/black-bas… #ADFind #PrintNightmare #ZeroLogon and #NoPac #privilegeescalation.

SentinelOne (@sentinelone) 's Twitter Profile Photo

Find the full report: #BlackBasta #Ransomware | Attacks deploy custom #EDR #evasion tools tied to #FIN7 assets.sentinelone.com/sentinellabs22…

Antonio Pirozzi (@_antoniopirozzi) 's Twitter Profile Photo

🔥🔥🔥Glad to share our latest research piece that I coauthored with Antonio Cocomazzi which unveils strong connections between #BlackBasta and #FIN7 based on exclusive shared tools. Moreover we revealed previously unknown tools and techniques. SentinelLabs Brian Bartholomew Phil Stokes ⫍🐠⫎

Antonio Cocomazzi (@splinter_code) 's Twitter Profile Photo

Glad to share our latest research about #BlackBasta #ransomware group which we found to have a connection with the #FIN7 group 🔥 Our analysis here 👇 cc Antonio Pirozzi sentinelone.com/labs/black-bas…

SentinelOne (@sentinelone) 's Twitter Profile Photo

✨On #SentinelLabs! Black Basta operational #TTPs revealing new tools and techniques and a link to FIN7. By Antonio Cocomazzi and Antonio Pirozzi. sentinelone.com/labs/black-bas… #ADFind #PrintNightmare #ZeroLogon and #NoPac #privilegeescalation.

Antonio Cocomazzi (@splinter_code) 's Twitter Profile Photo

#BlackBasta #Ransomware back to business with a new TOR domain Ext: .[random_9_chars] Ransom Note: instructions_read_me.txt TOR: https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd[.]onion/ Sample 👇 virustotal.com/gui/file/2558d…

#BlackBasta #Ransomware back to business with a new TOR domain

Ext: .[random_9_chars]
Ransom Note: instructions_read_me.txt
TOR: https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd[.]onion/

Sample 👇
virustotal.com/gui/file/2558d…
Antonio Cocomazzi (@splinter_code) 's Twitter Profile Photo

🔥 Brace yourself #LocalPotato is out 🥔 Our new NTLM reflection attack in local authentication allows for arbitrary file read/write & elevation of privilege. Patched by Microsoft, but other protocols may still be vulnerable. cc Andrea Pierini Enjoy! 👇 localpotato.com/localpotato_ht…

Antonio Cocomazzi (@splinter_code) 's Twitter Profile Photo

Think if Ransomware operators gonna publish exfiltrated data with a 10 hours video on YouTube 😵‍💫 Infinite storage space at no costs 🥳

Chi-en (Ashley) Shen (@ashl3y_shen) 's Twitter Profile Photo

After 3 years at Google TAG, I'm delighted to announce an exciting new chapter in my career. I'm joining Cisco Talos Intelligence Group to conduct threat intelligence research and counter threat actors. Looking forward to collaborating with brilliant minds and growing in this new adventure.

Antonio Pirozzi (@_antoniopirozzi) 's Twitter Profile Photo

Our analysis on the intriguing #liblzma supply chain case 🔥 By following all the interactions we provided an interesting angle on the TA's motivations and plan to Inject Further Vulnerabilities. It was a pleasure to work with @vx__notduck1e on this!! sentinelone.com/blog/xz-utils-…

SentinelOne (@sentinelone) 's Twitter Profile Photo

🚪 Our analysis of the xz backdoor and subtle changes in the code commits suggest that further backdoors were being planned. In our latest blog post by Sarthak Misraa and Antonio Pirozzi, we provide a technical breakdown. Read more: sentinelone.com/blog/xz-utils-…

SentinelOne (@sentinelone) 's Twitter Profile Photo

"The overall compromise spanned over two years," SentinelOne researchers Sarthak Misraa and Antonio Pirozzi  said in an analysis published last week. "Under the alias Jia Tan, the actor began contributing to the xz project on October 29, 2021." "Initially, the commits were

Will (@bushidotoken) 's Twitter Profile Photo

The latest eSentire blog is a good example of vendors using adversary monikers for a marketing boost. They state this activity is #FIN7 with no real explanation of how they came to that. They mention usage of #DiceLoader, but... 1/2 esentire.com/blog/fin7-uses…

Francesco Borrelli (@notiziefrance) 's Twitter Profile Photo

Napoli, lido completamente abusivo sulla spiaggia di Coroglio. In affitto ombrelloni con tavolini, lettini e sdraio. Tutto illegale. Anche bar senza alcuna licenza e norma igienica. Borrelli aggredito e insultato durante sopralluogo dai gestori legati alla criminalità .

Antonio Cocomazzi (@splinter_code) 's Twitter Profile Photo

Excited to share my latest research about FIN7 🔥 The discovery of a new abuse for the Windows built-in driver ProcLaunchMon.sys (TTD Monitor driver) to tamper with EDRs has been an interesting surprise. Enjoy the read 👇 sentinelone.com/labs/fin7-rebo…

Stefano (@stefano173456) 's Twitter Profile Photo

Vergogna. Avere qui la pazienza per ascoltare un danno umano prestato alla politica, significa riconoscere un errore grave: quello di poter credere che la malvagità può rendersi utile per la vita. Vi prego, basta solo 1 min e poco più per capire il tanfo che un essere produce.