Alex Matrosov(@matrosov) 's Twitter Profileg
Alex Matrosov

@matrosov

🔬Founder & CEO @Binarly_io, #codeXplorer, #efiXplorer, @REhints and "Rootkits and Bootkits" book. Previously worked at Nvidia, Cylance, Intel, ESET, Yandex.

ID:15426077

linkhttps://binarly.io calendar_today14-07-2008 13:01:52

8,7K Tweets

18,1K Followers

2,0K Following

BINARLY🔬(@binarly_io) 's Twitter Profile Photo

Fresh from Binarly REsearch team: We’ve completed an in-depth analysis of the , from initialization to the main hook enabling remote access.

Dive into our validated breakdown of techniques and backdoor functionalities, complete with proofs.
github.com/binarly-io/bin…

Fresh from Binarly REsearch team: We’ve completed an in-depth analysis of the #XZbackdoor, from initialization to the main hook enabling remote access. Dive into our validated breakdown of techniques and backdoor functionalities, complete with proofs. github.com/binarly-io/bin…
account_circle
Ryan Naraine(@ryanaraine) 's Twitter Profile Photo

🎧🔥 New pod advisory: I spent time with Cris Neckar on the early days of hacking at Neohapsis, time on the Google Chrome security team, shenanigans at Pwn2Own/Pwnium, the cat-and-mouse battle for browser exploit chains, and more...

LISTEN: podcasts.apple.com/us/podcast/cri…

account_circle
Alex Matrosov(@matrosov) 's Twitter Profile Photo

Binarly advisories are up and documenting detailed guidance for the security community, as always.

OOB Read in BMC firmware - Medium (CWE-125)
🔥BRLY-2024-002 binarly-io.webflow.io/advisories/brl…
🔥BRLY-2024-003 binarly-io.webflow.io/advisories/brl…
🔥BRLY-2024-004 binarly-io.webflow.io/advisories/brl…

Binarly advisories are up and documenting detailed guidance for the security community, as always. OOB Read in BMC firmware - Medium (CWE-125) 🔥BRLY-2024-002 binarly-io.webflow.io/advisories/brl… 🔥BRLY-2024-003 binarly-io.webflow.io/advisories/brl… 🔥BRLY-2024-004 binarly-io.webflow.io/advisories/brl…
account_circle
BINARLY🔬(@binarly_io) 's Twitter Profile Photo

NEW! In this blog, we discuss how our REsearchers discovered massive supply chain security failures in the AMI BMC ecosystem.

The silent Lighttpd security fix from 2018 impacted many device vendors, including Intel, Lenovo, Supermicro, and many others.

binarly.io/blog/lighttpd-…

NEW! In this blog, we discuss how our REsearchers discovered massive supply chain security failures in the AMI BMC ecosystem. The silent Lighttpd security fix from 2018 impacted many device vendors, including Intel, Lenovo, Supermicro, and many others. binarly.io/blog/lighttpd-…
account_circle
BINARLY🔬(@binarly_io) 's Twitter Profile Photo

As always, this is an amazing lineup! It's great to see so much attention to firmware and hardware security this year.

account_circle
stacksmashing(@ghidraninja) 's Twitter Profile Photo

Come see how I used my jerry-rigged “EMBite” probe to capture an EM side-channels using a HackRF.

I used this to figure out the precise timing of where a completely unknown boot check fails - and then used that timing to bypass the check 😁

Come see how I used my jerry-rigged “EMBite” probe to capture an EM side-channels using a HackRF. I used this to figure out the precise timing of where a completely unknown boot check fails - and then used that timing to bypass the check 😁
account_circle
offensivecon(@offensive_con) 's Twitter Profile Photo

How to Fuzz Your Way to Android Universal Root: Attacking Android Binder by Eugene Rodionov, Zi Fan Tan and Gulshan Singh offensivecon.org/speakers/2024/…

account_circle
Alex Matrosov(@matrosov) 's Twitter Profile Photo

Our xz.fail scanner detects generically ifunc implantation technique on any ELF file and could spot other projects implanted by the same technique. API open and bulk scans are welcome!

The uploads we face contain all shades of file manipulations and…

account_circle
Alex Matrosov(@matrosov) 's Twitter Profile Photo

I'm not sure if someone noticed, but Hex-Rays SA IDA shows a warning on the ifunc implantation technique used by , highlighting unusual relocation table manipulations. This warning shows only on implanted files🚪

I'm not sure if someone noticed, but @HexRaysSA IDA shows a warning on the ifunc implantation technique used by #xzbackdoor, highlighting unusual relocation table manipulations. This warning shows only on implanted files🚪
account_circle
blasty(@bl4sty) 's Twitter Profile Photo

some people asked for the code .. so I decided to quickly refactor my scrappy paramiko script and turned it into an ssh agent implementation that works with a vanilla openssh client that has a single line patched out. github.com/blasty/JiaTans…

some people asked for the code .. so I decided to quickly refactor my scrappy paramiko script and turned it into an ssh agent implementation that works with a vanilla openssh client that has a single line patched out. github.com/blasty/JiaTans…
account_circle
Alex Matrosov(@matrosov) 's Twitter Profile Photo

Our xz.fail scanner detects generically ifunc implantation technique on any ELF file and could spot other projects implanted by the same technique. API open and bulk scans are welcome!

The uploads we face contain all shades of file manipulations and…

account_circle
Ryan Naraine(@ryanaraine) 's Twitter Profile Photo

🔥 NEW! For your earholes this weekend: Costin Raiu joins the XZ backdoor investigation

Listen securityconversations.com/episode/costin…

account_circle