Simon (@techevo_) 's Twitter Profile
Simon

@techevo_

Principal Threat Hunter @ WithSecure

bsky.app/profile/techev…

ID: 235278328

linkhttps://blog.techevo.uk calendar_today07-01-2011 20:03:48

175 Tweet

81 Followers

701 Following

irfan_eternal (@irfan_eternal) 's Twitter Profile Photo

I wrote a blog about Understanding Internals of SmokeLoader. The Sample Consists of 3 Stages. We will look at each stages in detail in the blog. Please share your feedbacks irfan-eternal.github.io/understanding-…

Virus Bulletin (@virusbtn) 's Twitter Profile Photo

ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group they've named Blackwood. The NSPX30 implant is deployed via the update mechanisms of legitimate software such as Tencent QQ, WPS Office & Sogou Pinyin. welivesecurity.com/en/eset-resear…

ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group they've named Blackwood. The NSPX30 implant is deployed via the update mechanisms of legitimate software such as Tencent QQ, WPS Office & Sogou Pinyin. welivesecurity.com/en/eset-resear…
Stairwell (@insidestairwell) 's Twitter Profile Photo

🕵️‍♂️ The silent torrent of VileRAT Get an in-depth, technical look at #VileRAT, a sophisticated Python-based malware believed to be the work of the #Evilnum threat group. Read our latest #threatresearch report here: stairwell.com/resources/tech…

Kyle Cucci (@d4rksystem) 's Twitter Profile Photo

Not sure who needs to hear this, but I was today years old when I realized how effective conditional breakpoints in x64dbg are.. I had a need to break conditionally on all VirtualAlloc calls with a size parameter > 0x3000000. Here is how to do this.😎

Not sure who needs to hear this, but I was today years old when I realized how effective conditional breakpoints in x64dbg are.. I had a need to break conditionally on all VirtualAlloc calls with a size parameter > 0x3000000. Here is how to do this.😎
Jonny Johnson (@jsecurity101) 's Twitter Profile Photo

Happy Friday! I have gotten a lot of questions around ETW Patching as of late. I decided to write a blog on understanding ETW Patching, check it out! jsecurity101.medium.com/understanding-…

Daniel Jary (@janieldary) 's Twitter Profile Photo

Here is a little Linux detection telemetry tool I released as part of my Black Hat Arsenal presentation 'ELFieScanner: Advanced process memory threat detection on Linux' #BlackHat: github.com/JanielDary/ELF…

Rachel Tobac (@racheltobac) 's Twitter Profile Photo

Exec at Ferrari gets a call from "CEO" asking about acquisitions. Exec realizes that this could be a voice clone & asks the "CEO" which book they just talked about, catching the attacker! Thanks FORTUNE for talking with me about AI voice clones. fortune.com/2024/07/27/fer…

Volexity (@volexity) 's Twitter Profile Photo

.Volexity shares #threatintel on how #StormBamboo compromised an ISP to conduct DNS poisoning attacks on targeted organizations & abuse insecure HTTP software updates, delivering custom malware on both macOS + Windows. Read the full analysis: volexity.com/blog/2024/08/0… #dfir

Greg Linares (Laughing Mantis) (@laughing_mantis) 's Twitter Profile Photo

The Return of OceanLotus? During routine threat hunting here at Huntress analysts Jai Minton & Craig identified a sophisticated campaign with hallmark TTPs of APT32 aka BISMUTH, Ocean Buffalo, & Canvas Cyclone targeting human rights activists huntress.com/blog/advanced-…

Simon (@techevo_) 's Twitter Profile Photo

I took a look at a #warmcookie infection, and wrote an investigation walk-through using a #PCAP from malware_traffic, check it out: blog.techevo.uk/analysis/netwo…

Daniel Stepanic (@danielstepanic) 's Twitter Profile Photo

Had fun presenting #WARMCOOKIE research at #VB2024. The malware was recently updated with new handlers. Our team wrote some tooling to simulate the C2 server to help organizations build better detections. Tooling: github.com/elastic/labs-r…

Hunt.io (@huntio) 's Twitter Profile Photo

Read our latest blog post and get an inside look at Warmcookie’s updated C2 infrastructure linked to its latest update. 📡 We reveal insights into newly identified servers that can assist defenders in identifying related servers hunt.io/blog/from-warm…

Unit 42 (@unit42_intel) 's Twitter Profile Photo

A threat actor testing an AV/EDR bypass tool on rogue virtual machines inadvertently exposed their methods. This allowed us a deep dive into their operational strategies and multiple toolkits, including tracing their steps to cybercrime forums. Read now: bit.ly/4eb8nlh

A threat actor testing an AV/EDR bypass tool on rogue virtual machines inadvertently exposed their methods. This allowed us a deep dive into their operational strategies and multiple toolkits, including tracing their steps to cybercrime forums. Read now:  bit.ly/4eb8nlh
RemcoS (@rsprooten) 's Twitter Profile Photo

Check out my new blog post on declawing PUMAKIT, a sneaky #LKM #rootkit targeting Linux systems. Find out how it hides, escalates privileges, and stays under the radar. Don’t miss the deep-dive! elastic.co/security-labs/… #cybersecurity #malwareanalysis #linux

flux (@0xfluxsec) 's Twitter Profile Photo

Ok I think this is REALLY cool, I've now got Event Tracing for Windows: Threat Intelligence working with my EDR (not implemented yet into the main EDR) BUT you can see it catching remote memory allocations github.com/0xflux/Sanctum… #malware #blueteam #redteam #infosec #cyber #rust

Ok I think this is REALLY cool, I've now got Event Tracing for Windows: Threat Intelligence working with my EDR (not implemented yet into the main EDR) BUT you can see it catching remote memory allocations github.com/0xflux/Sanctum…

#malware #blueteam #redteam #infosec #cyber #rust
𝙁 𝙀 𝙇 𝙄 𝙓 𝙈 (@felixm_pw) 's Twitter Profile Photo

With some guidance from DebugPrivilege I've found a way to easily dump clear text implants even while they sleep. Bad day for sleep obfuscation 💤 blog.felixm.pw/rude_awakening…