Armin Buescher

@armbues

Security Researcher. Disclaimer: my tweets don't reflect the views of my current or past employers!

Vrijeme pridruživanja: rujan 2009.

Tweetovi

Blokirali ste korisnika/cu @armbues

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @armbues

  1. proslijedio/la je Tweet
    21. pro 2019.

    Red Teamers: It's great that we share our open source malware with the world - sharing is the only way to learn. Also Red Teamers: Don't tell anyone about our samples on VT.

    Poništi
  2. 20. pro 2019.

    But I heard him exclaim, ere he VPN'd out of sight— “Thanks for your data, and to all a good night!”

    Prikaži ovu nit
    Poništi
  3. 20. pro 2019.

    And laying his finger aside of his nose, And giving a nod, up the gateway he rose; He sprang to his server, to his team gave a whistle, And away they all flew like the down of a thistle.

    Prikaži ovu nit
    Poništi
  4. 20. pro 2019.

    A wink of his eye and a sandbox report Soon gave me to know I had no retort; He typed not a word, but clicked all his work, And filled all the ZIPs; then turned with a jerk,

    Prikaži ovu nit
    Poništi
  5. 20. pro 2019.

    His droll little mouth he drew up in a pinch, And the hair on his head was as green as the Grinch; He was chubby and plump, and coded in Delph, And I laughed when I saw him, in spite of myself;

    Prikaži ovu nit
    Poništi
  6. 20. pro 2019.

    He was dressed all in black, from his head to his foot, And his clothes were all tarnished with Cheetos and soot; A bundle of documents he had flung on his back, And he looked like a thief just opening his pack.

    Prikaži ovu nit
    Poništi
  7. 20. pro 2019.

    So up to the firewall the downloads they flew With the sleigh full of malware, and Powershell too— As I drew in my head, and was turning around, Down the proxy the operator came with a bound.

    Prikaži ovu nit
    Poništi
  8. 20. pro 2019.

    "Now, PlugX! now, PoisonIvy! now Termite and a dropper! On, gh0st! on, Mimikatz! on, Htran and China Chopper! To the top of the endpoint! to the top of the directory! Now dash away! dash away! dash away into the memory!"

    Prikaži ovu nit
    Poništi
  9. 20. pro 2019.

    With a little old operator so lively and at ease, I knew in a moment he must be Chinese. More rapid than eagles his tools they came, And he whistled, and shouted, and called them by name:

    Prikaži ovu nit
    Poništi
  10. 20. pro 2019.

    The moon on the breast of the display glow, Gave a lustre of midday to the keyboard below, When what to my wondering eyes did appear, But a miniature loader that gave me fear,

    Prikaži ovu nit
    Poništi
  11. 20. pro 2019.

    When out on Twitter there arose such a clatter, I sprang from my bed to see what was the matter. Away to the laptop I flew like a flash, Tore open the logs and threw up the bash.

    Prikaži ovu nit
    Poništi
  12. 20. pro 2019.

    The analysts were nestled all snug in their beds; While visions of assembly danced in their heads; And the red team in their hoodies, and I in my cap, Had just settled our brains for a long winter's nap,

    Prikaži ovu nit
    Poništi
  13. 20. pro 2019.

    A little christmassy APT poem: 'Twas the night before Christmas, when all through the net Not a creature was stirring, not even a RAT; The signatures were hung in VirusTotal with care, In hopes that threat actors soon would be there;

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    21. stu 2019.

    What started as an unpleasant argument about security research and attribution turned into a very good, constructive, and fruitful discussion in the DM. I hope that it will serve as grounds for future cooperation. Cheers , I appreciate the time you took to talk to me 👍

    Poništi
  15. proslijedio/la je Tweet
    25. lip 2019.

    APT10 is the new deep panda

    Poništi
  16. 25. lip 2019.

    Threat intel attribution deniability: When you don't share IOCs in a public blog, nobody can disprove the link of a campaign to an actor.

    Poništi
  17. proslijedio/la je Tweet

    APT10/CloudHopper has been written about publicly by BAE, PwC, KL, FireEye, CrowdStrike... with such a broad claim, why publish a story unsubstantiated by IOCs nor victim accounts?

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    25. lip 2019.
    Odgovor korisniku/ci

    Based on the writeup, likely associated files are: fa599fddd6b6df4b654e022fe7a91c82152f983e1ce0b97406eb27bb2fb4c3ab 12979d85d37a7e246757d5ebf238c6ac91e6641950cf45d95b104eb7dbb7db71 c81dd8dd3623181cbc117ca7255e6ea530f770c05624c6896362f03fbfc06280 If these are related, not APT10.

    Poništi
  19. proslijedio/la je Tweet
    20. lip 2019.

    Good indications that (Russian) Snake took over infrastructure from (likely Iranian) APT34, corroborating hypothesis that 4th party collection is and will be a thing. No doubt, unexperienced infosec outfits will confuse attribution in the future. Attribution is for experts.

    Poništi
  20. proslijedio/la je Tweet

    NEW: Symantec finds evidence attackers may have hijacked a separate espionage group’s infrastructure during attack on target in Middle East.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·