Van(@Wanna_VanTa) 's Twitter Profileg
Van

@Wanna_VanTa

Research & Discovery Lead @Mandiant @googlecloud Specialties: researching adversary tradecraft, hardstuck masters TFT, and losing sneaker raffles.

ID:1240794620671471623

calendar_today20-03-2020 00:18:25

673 Tweets

4,0K Followers

403 Following

Van(@Wanna_VanTa) 's Twitter Profile Photo

Come see a talk from one of the key drivers of this research. is noteworthy not only for their crafty exploitation of Barracuda ESGs, but for their ability to quickly adapt to remediation efforts.

account_circle
Aaron Stephens(@x04steve) 's Twitter Profile Photo

Don’t tell me, show me.

The priority and order of too much threat intel seems to be narrative first, data/evidence second. The story I want to be told is not your hypothesis, it’s how you got there. We would all benefit from getting a lot more comfortable showing our work.

account_circle
Van(@Wanna_VanTa) 's Twitter Profile Photo

When Bryce went to Bryce, Bryce bought Van a Bryce shirt. So when Van went to Bryce, Van bought Bryce a Bryce shirt. Now Bryce must go to Van and buy Van a Van shirt.

When @bryceabdo went to Bryce, Bryce bought Van a Bryce shirt. So when Van went to Bryce, Van bought Bryce a Bryce shirt. Now Bryce must go to Van and buy Van a Van shirt. #vancity #MYcity
account_circle
Greg Lesnewich(@greglesnewich) 's Twitter Profile Photo

Friday drop - a lil POC for trying to find similarity across Macho files!

tl;dr two scripts to get:
🔧 dylib hash (dependencies)
🏗️ export hash
🛂 import hash
👷‍♂️ certificate name

hoping we can use this to a our quick pivots across Mac malware !

github.com/g-les/macho_si…

account_circle
Van(@Wanna_VanTa) 's Twitter Profile Photo

Incredible reporting detailing the vulnerability ecosystem within China, and how that very ecosystem enables their cyber actors.

account_circle
Mathew(@mittypk) 's Twitter Profile Photo

Mandiant Just dropped our deep-dive analysis on the 🇨🇳 global espionage campaign exploiting a 0-day in Barracuda ESG appliances since OCT 2022. We include more information about how responded to remediation activities
mandiant.com/resources/blog…

account_circle
Doug Bienstock(@doughsec) 's Twitter Profile Photo

Today we launched a 🔎 scanning tool for orgs to search their Citrix netscalers for evidence of CVE-2023-3519 post-exploration. You can run this direct on the ADC or against a forensic image. With public POCs out there expect more exploitation!

mandiant.com/resources/blog…

account_circle