Yun (@yunzhenghu) 's Twitter Profile
Yun

@yunzhenghu

ID: 295255006

calendar_today08-05-2011 17:24:06

707 Tweet

359 Followers

696 Following

Fox-IT (@foxit) 's Twitter Profile Photo

Join us for a webinar on Dissect, Fox-ITโ€™s in-house developed enterprise-scale forensics framework for data acquisition and analysis. It has enabled our IR practice to push its capabilities, increase its speed and provide more value to our customers.event.on24.com/wcc/r/3910820/โ€ฆ

13Cubed (@13cubeddfir) 's Twitter Profile Photo

Merry Christmas ๐ŸŽ„! Hereโ€™s a new 13Cubed episode about Dissect -- a powerful, now open source, IR framework. Enjoy! youtube.com/watch?v=A2e203โ€ฆ #DFIR #forensics

Yun (@yunzhenghu) 's Twitter Profile Photo

In this blog post, we share our research on version identification of Citrix ADC and Gateway servers and how we measured the update adoption on the internet for CVE-2022-27510 & CVE-2022-27518, two critical CVEs with a CVSS v3 score of 9.8 blog.fox-it.com/2022/12/28/cveโ€ฆ

Fox-IT (@foxit) 's Twitter Profile Photo

๐ŸšจFox-IT and Dutch Institute for Vulnerability Disclosure have revealed that a exploitation campaign targeting Citrix NetScalers has backdoored approximately 2K NetScalers worldwide! Check your NetScalers for indicators of compromise, even after patching CVE-2023-3519!๐Ÿ”’ ๐Ÿ”—blog: blog.fox-it.com/2023/08/15/appโ€ฆ

Fox-IT (@foxit) 's Twitter Profile Photo

๐ŸšจIMPORTANT๐Ÿšจ We have observed that the implant placed on tens of thousands of Cisco devices has been altered to check for an Authorization HTTP header value before responding [1/3]

Fox-IT (@foxit) 's Twitter Profile Photo

๐Ÿ™‹โ€โ™‚๏ธUpdate! With Cisco IOS XE CVE-2023-20198 exploitation details now public, we're releasing our Suricata rules. These rules monitor for a percent-encoded-percent which can be used to bypass authentication on unpatched Cisco IOS XE devices. github.com/fox-it/cisco-iโ€ฆ [1/2]

Fox-IT (@foxit) 's Twitter Profile Photo

We hypothesize that the adversary patched this authentication bypass using the implant by returning a 404 whenever the request URI contains a percent sign. In other words, the implant ensured nobody other than the initial actor would be able to compromise the Cisco device. [2/2]

We hypothesize that the adversary patched this authentication bypass using the implant by returning a 404 whenever the request URI contains a percent sign. In other words, the implant ensured nobody other than the initial actor would be able to compromise the Cisco device. [2/2]
Fox-IT (@foxit) 's Twitter Profile Photo

Discover the latest insights on Blister malware in our new blog. We examine past payloads and delve into recent developments. ๐Ÿ•ต๏ธโ€โ™‚๏ธ๐Ÿฉน #BlisterMythic #Blister blog.fox-it.com/2023/11/01/popโ€ฆ

Fox-IT (@foxit) 's Twitter Profile Photo

๐Ÿš€ Our open-source Dissect project now supports reading Fortinet firmware files! ๐Ÿ›ก๏ธ Easily mount, browse or dump FortiGate firmware files hassle-free with Dissect. No extra steps needed! #Dissect #Fortinet #FortiGate #Firmware github.com/fox-it/dissectโ€ฆ

๐Ÿš€ Our open-source Dissect project now supports reading Fortinet firmware files! ๐Ÿ›ก๏ธ Easily mount, browse or dump FortiGate firmware files hassle-free with Dissect. No extra steps needed! #Dissect #Fortinet #FortiGate #Firmware

github.com/fox-it/dissectโ€ฆ
Bad Sector Labs (@badsectorlabs) 's Twitter Profile Photo

The xz package tar's were backdoored. Only discovered because the backdoor slowed down sshd enough for Andres Freund to investigate. Consider the case where the backdoor didn't cause perf issues... How long would this have gone undetected? openwall.com/lists/oss-secuโ€ฆ

The Shadowserver Foundation (@shadowserver) 's Twitter Profile Photo

Attention: we are sharing a one-off special report on Cactus ransomware group campaign targeting Qlik Sense (data viz & business intelligence tool): shadowserver.org/what-we-do/netโ€ฆ 2894 IPs found vulnerable to CVE-2023-48365 91 IPs found compromised by Cactus ransomware group

Attention: we are sharing a one-off special report on Cactus ransomware group campaign targeting Qlik Sense (data viz & business intelligence tool): shadowserver.org/what-we-do/netโ€ฆ

2894 IPs found vulnerable to CVE-2023-48365

91 IPs found compromised by Cactus ransomware group
Fox-IT (@foxit) 's Twitter Profile Photo

๐Ÿง€ ๐—ก๐—ฒ๐˜„ ๐—ฏ๐—น๐—ผ๐—ด: "๐—ง๐—ต๐—ฟ๐—ฒ๐—ฒ ๐—Ÿ๐—ฎ๐˜‡๐—ฎ๐—ฟ๐˜‚๐˜€ ๐—ฅ๐—”๐—ง๐˜€ ๐—–๐—ผ๐—บ๐—ถ๐—ป๐—ด ๐—ณ๐—ผ๐—ฟ ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—–๐—ต๐—ฒ๐—ฒ๐˜€๐—ฒ" Read about PondRAT, ThemeForestRAT and RemotePE - three RATs we encountered during incident response involving the Lazarus group. Check the indicators and don't let them steal

lazarusholic (@lazarusholic) 's Twitter Profile Photo

"Three Lazarus RATs coming for your cheese" published by Fox-IT. #Lazarus, #PondRAT, #RemotePE, #ThemeForestRAT, #DPRK, #CTI blog.fox-it.com/2025/09/01/thrโ€ฆ

Nicolas Bareil (@nbareil) 's Twitter Profile Photo

Thanks Fox-IT for github.com/fox-it/dissect. This project is totally underrated. I tried it once before, but it didnโ€™t click until a few weeks ago. Itโ€™s a masterpiece that radically changed my IR workflows, enabling me to implement forensics playbooks I dreamed for years ๐Ÿ’™๐Ÿ’™๐Ÿ’™

๐™ฝ๐™ด๐šƒ๐š๐™ด๐š‚๐™ด๐™ฒ (@netresec) 's Twitter Profile Photo

Yun It's really great to see more tools adopting this method for streaming packet data! We're missing that feature in Suricata IDS/IPS though. Native pcap-over-ip support in Suricata would eliminate the need for this: nc localhost 57012 | suricata -r /dev/stdin redmine.openinfosecfoundation.org/issues/5499