Michael Kajiloti (@kajilot) 's Twitter Profile
Michael Kajiloti

@kajilot

Research, Security, Malware, Cryptocurrency.
Apparently a drunk rock.

ID: 825432141009936384

calendar_today28-01-2017 19:55:33

79 Tweet

448 Followers

94 Following

Ignacio Sanmillan (@ulexec) 's Twitter Profile Photo

My first blog with ESET Research is up documenting a cyber-espionage toolkit we called Ramsay, likely designed to spread within air-gapped networks via a file-based protocol and parasitic file infection. Some overlaps with #DarkHotel's Retro were found. x.com/ESETresearch/s…

polka (@polarply) 's Twitter Profile Photo

My new blog post about continued Ke3chang (APT15 🇨🇳) tool changes in 2020 and their new "Ketrum" tools. intezer.com/blog/research/… Zuzana Hromcova was very helpful with her previous documentation of the group's activities in 2019.

My new blog post about continued Ke3chang (APT15 🇨🇳) tool changes in 2020 and their new "Ketrum" tools.
intezer.com/blog/research/…

<a href="/zuzana_hromcova/">Zuzana Hromcova</a> was very helpful with her previous documentation of the group's activities in 2019.
Ari Eitan (@arieitan) 's Twitter Profile Photo

We just shared our Linux binaries map, which allows you to explore the code-sharing relationship between all binary files in a standard Azure Ubuntu cloud workload! intezer.com/linux-binaries… Raw data available here - github.com/intezer/Linux-…

Avigayil Mechtinger (@abbymch) 's Twitter Profile Photo

My very first blog is now published! Part 1 out of a multi-part series that will provide you practical knowledge for #ELF malware analysis. Check it out hubs.ly/H0ryf110

Intezer (@intezerlabs) 's Twitter Profile Photo

Undetected Doki attack actively infecting vulnerable #Docker servers in the cloud. Attacker uses a novel Domain Generation Algorithm (DGA) based on a DogeCoin digital wallet to generate C&C domains. Research by Nicole and Michael Kajiloti hubs.ly/H0t0qdB0

Nicole (@nicolefishi19) 's Twitter Profile Photo

My very first blog is out! As part of an ongoing attack on vulnerable Docker servers, a new undetected malware called Doki is dropped. It uses DogeCoin digital wallet to generate C&C domains. Check it out: intezer.com/container-secu…

Ari Eitan (@arieitan) 's Twitter Profile Photo

Huge discovery by our research team - #Docker servers in the cloud with exposed API are at risk of being hacked within a few hours with a fully undetected #Linux malware. Payload with 0 detections in VT for months. Read the technical report here - intezer.com/container-secu…

Huge discovery by our research team - #Docker servers in the cloud with exposed API are at risk of being hacked within a few hours with a fully undetected #Linux malware.
Payload with 0 detections in VT for months. Read the technical report here - 

intezer.com/container-secu…
polka (@polarply) 's Twitter Profile Photo

I wrote a tutorial how to hunt for malware that uses OST libraries. It's a pretty advanced technique and I've been able to catch some low detected samples and track threat groups migrating to use new OST libraries using this technique. Hope you enjoy. intezer.com/blog/threat-hu…

Intezer (@intezerlabs) 's Twitter Profile Photo

TeamTNT is abusing a legitimate tool to gain full control over victim servers—essentially functioning as a backdoor. To our knowledge, this is the first time an attacker has used legitimate third party software to target cloud infrastructure hubs.li/H0vP59y0

TeamTNT is abusing a legitimate tool to gain full control over victim servers—essentially functioning as a backdoor. To our knowledge, this is the first time an attacker has used legitimate third party software to target cloud infrastructure hubs.li/H0vP59y0
Nicole (@nicolefishi19) 's Twitter Profile Photo

My new blog post about TeamTNT abusing a legitimate tool to gain full control over victim servers, first time attackers use legitimate 3rd party software to target Linux and cloud infrastructure. Check it out: intezer.com/blog/cloud-wor…

polka (@polarply) 's Twitter Profile Photo

Here it is, proud to release the OST map. A central location to track threat actor usage of open source offensive tools. I have man people to thank for allowing me to speak with both sides of the debate to understand this issue deeply. Enjoy! :)

Intezer (@intezerlabs) 's Twitter Profile Photo

Operation #ElectroRAT Already thousands of crypto wallets stolen. Extensive campaign includes written from scratch RAT hidden in trojanized applications. Windows, Linux and macOS samples undetected in VirusTotal intezer.com/blog/research/…

Operation #ElectroRAT

Already thousands of crypto wallets stolen. Extensive campaign includes written from scratch RAT hidden in trojanized applications. 

Windows, Linux and macOS samples undetected in VirusTotal
intezer.com/blog/research/…
Avigayil Mechtinger (@abbymch) 's Twitter Profile Photo

[1/7] Operation #ElectroRAT is a new campaign that takes sizable measures to steal crypto wallets. For more information about the operation - intezer.com/blog/research/… The following is a technical analysis-> Intezer

Gal Elbaz (@galelbaz1) 's Twitter Profile Photo

Today! At @AppSec Village, Guy Kaplan and I will dive into open-source shadow vulnerabilities and shed light on an emerging vulnerability concept and our journey uncovering it. Be there! #defcon31 DEF CON. appsecvillage.com/events/dc-2023…

Oligo Security (@oligosecurity) 's Twitter Profile Photo

🚨 #ShellTorch New CVSS: 9.8 vulnerability in #PyTorch model server TorchServe, threatens countless #AI users. Immediate action is required! >> oligo.security/blog/shelltorc…

Gal Elbaz (@galelbaz1) 's Twitter Profile Photo

🚨 Apple released security updates for multiple devices. Of these, 5 vulnerabilities in AirPlay were reported by the Oligo Security research team.