Andrew Northern 𓅓 (@ex_raritas) 's Twitter Profile
Andrew Northern 𓅓

@ex_raritas

🔮 Senior Threat Researcher at @proofpoint 🔮 | Knowledge Piñata 🪅 | Attack Chain Connoisseur | Epicurean

ID: 30162428

linkhttps://www.proofpoint.com/us/blog/threat-insight calendar_today10-04-2009 04:39:38

16,16K Tweet

4,4K Takipçi

972 Takip Edilen

Andrew Northern 𓅓 (@ex_raritas) 's Twitter Profile Photo

I know I posted about this earlier, but if you missed the linked thread, take a moment to read it. Imagine being a SOC analyst responding to an alert. Most IOC or reputation feeds tell you something was flagged, but not why. Or even in some cases if it’s just stale data creating

tuckner (@tuckner) 's Twitter Profile Photo

How does a malicious coin miner end up running from an extension you install from the VS code marketplace? It can start by a developer copying another extension.

How does a malicious coin miner end up running from an extension you install from the VS code marketplace?  It can start by a developer copying another extension.
tuckner (@tuckner) 's Twitter Profile Photo

From North Korean tradecraft to being used in Cursor extensions in two weeks. Etherhiding is a technique where malware can use Ethereum contracts as a resilient C2 channel detailed by Google Oct 15th. It is now appearing in code extensions with the first sighting November 1st.

From North Korean tradecraft to being used in Cursor extensions in two weeks. Etherhiding is a technique where malware can use Ethereum contracts as a resilient C2 channel detailed by Google Oct 15th. It is now appearing in code extensions with the first sighting November 1st.
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

If I wanted a scripting language optimised for maximum obfuscation and signature evasion, I’d model it on PowerShell This talk by Daniel Bohannon breaks down the real-world methods attackers use youtube.com/watch?v=mej5L9…

If I wanted a scripting language optimised for maximum obfuscation and signature evasion, I’d model it on PowerShell

This talk by <a href="/danielhbohannon/">Daniel Bohannon</a> breaks down the real-world methods attackers use
youtube.com/watch?v=mej5L9…