B3ndik (@vmptrst) 's Twitter Profile
B3ndik

@vmptrst

ID: 1641045068

calendar_today02-08-2013 18:22:15

30 Tweet

110 Takipçi

492 Takip Edilen

Nick Carr (@itsreallynick) 's Twitter Profile Photo

We found the full CARBANAK source code & previously unseen plugins. Our #FLARE team spent 500 hours analyzing the 100,000+ lines of code. 𝕸𝓎𝖐𝖎𝖑𝖑 ☠️ & James T. Bennett just dropped day 1 of their 4-part blog series: fireeye.com/blog/threat-re… Source code linked in blog. #CarbanakWeek 🦈💳

We found the full CARBANAK source code & previously unseen plugins.

Our #FLARE team spent 500 hours analyzing the 100,000+ lines of code.
<a href="/mykill/">𝕸𝓎𝖐𝖎𝖑𝖑 ☠️</a> &amp; <a href="/jtbennettjr/">James T. Bennett</a> just dropped day 1 of their 4-part blog series: fireeye.com/blog/threat-re…
Source code linked in blog. #CarbanakWeek 🦈💳
Vitaly Kamluk (@vkamluk) 's Twitter Profile Photo

Technical details and IOCs from our #ShadowHammer research, link to #ShadowPad attacks: securelist.com/operation-shad…

Nick Carr (@itsreallynick) 's Twitter Profile Photo

. If you're looking to spice up the video: I work at a 𝗥𝘂𝘀𝘀𝗶𝗮𝗻 𝗚𝗼𝘃𝗲𝗿𝗻𝗺𝗲𝗻𝘁 𝗔𝗴𝗲𝗻𝗰𝘆, we use Cobalt Strike to 𝘀𝘁𝗮𝘆 𝗶𝗻 𝘁𝗼𝘂𝗰𝗵 𝘄𝗶𝘁𝗵 𝗳𝗿𝗶𝗲𝗻𝗱𝘀 𝗮𝗿𝗼𝘂𝗻𝗱 𝘁𝗵𝗲 𝗲𝗹𝗲𝗰𝘁𝗶𝗼𝗻𝘀.

Yonathan Klijnsma (@ydklijnsma) 's Twitter Profile Photo

It was to be expected but sadly a reality now; an exploit kit for Android devices going around dropping ransomware: bluecoat.com/security-blog/…

Cyber Sun Tzu (@suntzusec) 's Twitter Profile Photo

If your opponent is ill-tempered, seek to social engineer him. Pretend to be weak, that he may grow arrogant. His jimmies will rustle.

Maarten van Dantzig (@maartenvdantzig) 's Twitter Profile Photo

Several security blogs advice to block iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com, this is the kill-switch domain, do >NOT< block it.

Lesley Carhart (@hacks4pancakes) 's Twitter Profile Photo

Every article that included a *live link* to the wcry killswitch domain. You suck and I hope your coffee is slightly sub par today.

Mathy Vanhoef (@vanhoefm) 's Twitter Profile Photo

Key Reinstallation Attacks: Breaking WPA2 by forcing nonce reuse krackattacks.com and see the paper at papers.mathyvanhoef.com/ccs2017.pdf