Andrew Northern ๐“…“ (@ex_raritas) 's Twitter Profile
Andrew Northern ๐“…“

@ex_raritas

๐Ÿ”ฎ Senior Threat Researcher at @proofpoint ๐Ÿ”ฎ | Knowledge Piรฑata ๐Ÿช… | Attack Chain Connoisseur | Epicurean

ID: 30162428

linkhttps://www.proofpoint.com/us/blog/threat-insight calendar_today10-04-2009 04:39:38

16,16K Tweet

4,4K Followers

972 Following

Andrew Northern ๐“…“ (@ex_raritas) 's Twitter Profile Photo

I know I posted about this earlier, but if you missed the linked thread, take a moment to read it. Imagine being a SOC analyst responding to an alert. Most IOC or reputation feeds tell you something was flagged, but not why. Or even in some cases if itโ€™s just stale data creating

tuckner (@tuckner) 's Twitter Profile Photo

How does a malicious coin miner end up running from an extension you install from the VS code marketplace? It can start by a developer copying another extension.

How does a malicious coin miner end up running from an extension you install from the VS code marketplace?  It can start by a developer copying another extension.
tuckner (@tuckner) 's Twitter Profile Photo

From North Korean tradecraft to being used in Cursor extensions in two weeks. Etherhiding is a technique where malware can use Ethereum contracts as a resilient C2 channel detailed by Google Oct 15th. It is now appearing in code extensions with the first sighting November 1st.

From North Korean tradecraft to being used in Cursor extensions in two weeks. Etherhiding is a technique where malware can use Ethereum contracts as a resilient C2 channel detailed by Google Oct 15th. It is now appearing in code extensions with the first sighting November 1st.
Florian Roth โšก๏ธ (@cyb3rops) 's Twitter Profile Photo

If I wanted a scripting language optimised for maximum obfuscation and signature evasion, Iโ€™d model it on PowerShell This talk by Daniel Bohannon breaks down the real-world methods attackers use youtube.com/watch?v=mej5L9โ€ฆ

If I wanted a scripting language optimised for maximum obfuscation and signature evasion, Iโ€™d model it on PowerShell

This talk by <a href="/danielhbohannon/">Daniel Bohannon</a> breaks down the real-world methods attackers use
youtube.com/watch?v=mej5L9โ€ฆ