imp0rtp3

@imp0rtp3

Security Researcher, Threat Intelligence And Malware Analysis for fun. Keybase: imp0rtp3

Joined June 2021

Tweets

You blocked @imp0rtp3

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @imp0rtp3

  1. Pinned Tweet
    25 Nov 2021

    Really excited to finally publish my malware research of SoWaT - APT31's router implant.

    Show this thread
    Undo
  2. Retweeted
    15 Dec 2021

    . 🇫🇷New publication on . Two publications, the first on on the intrusion set (TTPs etc.) and another on aka ↘️

    Show this thread
    Undo
  3. Retweeted
    11 Dec 2021

    Log4Shell Detector v0.1 Python based scanner that tries to detect even the most obfuscated versions of the exploit code - first version: I did a few tests, not more - please provide pull requests with improvements

    Undo
  4. 25 Nov 2021
    Show this thread
    Undo
  5. 25 Nov 2021

    Thanks to & for mentioning and attributing the sample and for their excellent APT31 report:)

    Show this thread
    Undo
  6. 12 Nov 2021
    Undo
  7. Retweeted
    10 Nov 2021
    Undo
  8. Retweeted
    10 Nov 2021

    , , ... whatever its name, 's team had an in-depth look at this 🇨🇳intrusion set. 🧐Discover our latest research findings on the infrastructure and implants used by APT31:

    Undo
  9. Retweeted
    1 Nov 2021

    published an article (our CEO and co-founder) wrote about a state-sponsored surveillance JS framework found by researchers , , and . Read more =>

    Undo
  10. 28 Oct 2021

    One would think that before declaring to invest $20 Billion on cybersecurity Microsoft could sign their own executables, which are literally shipped with every Windows image.

    Undo
  11. Retweeted
    28 Oct 2021

    I had a dream. In that dream all Windows security components had digital signatures. Then I woke up.

    Undo
  12. Retweeted
    27 Oct 2021

    Nice research by . We track this as FinickyFrogfish and is used by TA444 🇰🇵 (DPRK actor using CageyChameleon). Throughout 2019 and 2020 this implant was used to manage various TA444 C2s. In at least one case it was deployed via brute-forcing RDP.

    Show this thread
    Undo
  13. Retweeted

    We have good news — after years OneDrive is finally hosting no malware listed on , and for the first time in history Microsoft have fallen off the top ten malware hosters. All the Bazaloader, BazaISO and Qakbot TR payloads are gone. Keep it up MS. Customers are safer.

    Show this thread
    Undo
  14. Retweeted
    18 Oct 2021

    I think a lot about detection as being part of a spectrum (™) and that is typically a defensive centric view of logic designed to find evil and resulting tech/data/time/threat density. A diff way to think about it might be to think about a range of adversary control.

    Show this thread
    Undo
  15. Retweeted
    17 Oct 2021

    In ~80% of the APT cases in the years 2012 to 2019 (when I got out of IR) we found evidence in Antivirus logs of the affected systems (password dumpers, web shells, malicious scripts, malware) It isn't a tool problem. It's an attention problem.

    Show this thread
    Undo
  16. 13 Oct 2021

    Really nice research by . It's great to see more companies addressing the societal and economical context and connecting it to the TTPs.

    Undo
  17. 8 Oct 2021

    Great move by , I hope it will catch on to more companies.

    Undo
  18. 8 Oct 2021

    Really interesting to see the shift of Sofacy from custom made high quality arsenal like , and to "service-reset-password-moderate-digital[.]rf[.]gd"

    Undo
  19. 8 Oct 2021
    Undo
  20. 29 Sep 2021

    If you wonder what's the problem with the industry, describes it here vividly:

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·