Int2e_'s profile picture. Malware research and threat intel
ex #DFIR responder at @Mandiant

Adrien B

@Int2e_

Malware research and threat intel ex #DFIR responder at @Mandiant

Adrien B reposted

🚨BREAKING: We uncovered LANDFALL — a commercial-grade Android spyware exploiting a now-patched Samsung zero-day (CVE-2025-21042) through weaponized DNG images sent via WhatsApp, enabling zero-click compromise of Samsung Galaxy devices. 1/ unit42.paloaltonetworks.com/landfall-is-ne…


Adrien B reposted

Someone's really having a lot of fun with DNG. Another (!) DNG vuln patched in 2025-10 Samsung update. Google TAG assesses surveillance vendors may have been aware of this vuln (though not presently clear if deployed ITW or not) project-zero.issues.chromium.org/issues/4424237…


Adrien B reposted

We really should be talking about this more....KASLR is just not working properly on Android right now, and it hasn't for a long time. googleprojectzero.blogspot.com/2025/11/defeat…


Adrien B reposted

A recent analysis revealed MystRodX, a sophisticated C++ backdoor, employing dual-mode activation and advanced encryption, has been lurking undetected since 2024, posing a significant threat to network security. #MystRodX #CyberSecurity ift.tt/8vtwxFQ


Adrien B reposted

Meta and Russian Yandex engaged in unprecedented internet tracking practices, likely illegal with EU data protection law. Companies designed tracking systems that exploited Android's localhost socket permissions to create covert communication channels between websites and native…

lukOlejnik's tweet image. Meta and Russian Yandex engaged in unprecedented internet tracking practices, likely illegal with EU data protection law. Companies designed tracking systems that exploited Android's localhost socket permissions to create covert communication channels between websites and native…
lukOlejnik's tweet image. Meta and Russian Yandex engaged in unprecedented internet tracking practices, likely illegal with EU data protection law. Companies designed tracking systems that exploited Android's localhost socket permissions to create covert communication channels between websites and native…
lukOlejnik's tweet image. Meta and Russian Yandex engaged in unprecedented internet tracking practices, likely illegal with EU data protection law. Companies designed tracking systems that exploited Android's localhost socket permissions to create covert communication channels between websites and native…
lukOlejnik's tweet image. Meta and Russian Yandex engaged in unprecedented internet tracking practices, likely illegal with EU data protection law. Companies designed tracking systems that exploited Android's localhost socket permissions to create covert communication channels between websites and native…

Adrien B reposted

The Microsoft Threat Intelligence Center (MSTIC) is looking for malware reverse engineers and security researchers to join our team! Come join our brilliant, world-class team of malware REs and intelligence researchers: Principal Security Researcher (United States):…


Adrien B reposted

Based on our findings and those reported by governments and other security vendors, Microsoft Threat Intelligence assesses the Russian nation-state actor we track as Secret Blizzard has used the tools and infrastructure of at least 6 other threat actors during the past 7 years.


Adrien B reposted

Microsoft identified multiple vulnerabilities in the open-source platform OpenVPN, integrated into millions of devices worldwide, which could be exploited to create an attack chain allowing remote code execution (RCE) and local privilege escalation (LPE). msft.it/6014llDIQ


Adrien B reposted

CrowdStrike is actively working with customers impacted by a defect found in a single content update for Windows hosts. Mac and Linux hosts are not impacted. This is not a security incident or cyberattack. The issue has been identified, isolated and a fix has been deployed. We…


Adrien B reposted

Trend Micro's Christopher So looks into two techniques used by Earth Freybug (a subset of APT41) in the UNAPIMON malware: dynamic-link library hijacking & application programming interface (API) unhooking to prevent child processes from being monitored. trendmicro.com/en_us/research…

virusbtn's tweet image. Trend Micro's Christopher So looks into two techniques used by Earth Freybug (a subset of APT41) in the UNAPIMON malware: dynamic-link library hijacking & application programming interface (API) unhooking to prevent child processes from being monitored. trendmicro.com/en_us/research…

Adrien B reposted

#100DaysofYARA Day 07 - another condition only rule this time looking for the HTTPSnoop and PipeSnoop families found by Talos a little avant garde, but both store config info in the .data section, XOR'd with a 1 byte key following the same structure github.com/100DaysofYARA/…

greglesnewich's tweet image. #100DaysofYARA Day 07  - another condition only rule this time looking for the HTTPSnoop and PipeSnoop families found by Talos

a little avant garde, but both store config info in the .data section, XOR'd with a 1 byte key following the same structure

github.com/100DaysofYARA/…
greglesnewich's tweet image. #100DaysofYARA Day 07  - another condition only rule this time looking for the HTTPSnoop and PipeSnoop families found by Talos

a little avant garde, but both store config info in the .data section, XOR'd with a 1 byte key following the same structure

github.com/100DaysofYARA/…

Adrien B reposted

#100DaysOfYara Day 6: Yara can be used to access specific data at a given position. 👇 This feature is often used to identify Magic Numbers (used to determine the file format) to match your rule against a specific file type, such as a PE (0x4D5A), for example. Today, no…

fr0gger_'s tweet image. #100DaysOfYara Day 6: Yara can be used to access specific data at a given position. 👇

This feature is often used to identify Magic Numbers (used to determine the file format) to match your rule against a specific file type, such as a PE (0x4D5A), for example.

Today, no…

Adrien B reposted

#100DaysofYARA Day 6 sometimes our pals in TA404/Zinc/Temp.HERMIT/Diamond Sleet reuse export names and add a dubya ("W") to the end of the second name. lets create a loose rule looking for duplicates like that! Examples in the second pic thanks to Ronnie Coleman

greglesnewich's tweet image. #100DaysofYARA Day 6 

sometimes our pals in TA404/Zinc/Temp.HERMIT/Diamond Sleet reuse export names and add a dubya ("W") to the end of the second name. 

lets create a loose rule looking for duplicates like that! 

Examples in the second pic thanks to Ronnie Coleman
greglesnewich's tweet image. #100DaysofYARA Day 6 

sometimes our pals in TA404/Zinc/Temp.HERMIT/Diamond Sleet reuse export names and add a dubya ("W") to the end of the second name. 

lets create a loose rule looking for duplicates like that! 

Examples in the second pic thanks to Ronnie Coleman

Adrien B reposted

[1/4] Joined by @vmptrst (@PwC) and @MsftSecIntel, we release attribution information on the Sandman #APT, first revealed at @labscon_io '23. Link 👇 s1.ai/LuaDream


Adrien B reposted

Microsoft has uncovered a supply chain attack by North Korean threat actor Diamond Sleet (ZINC) involving the modification of an installer file from software maker CyberLink. The payload calls back to attacker infrastructure for instructions. Learn more: msft.it/6013iHoQF


Adrien B reposted

Teaser: we're working on a new #YARA module to enhance in-memory matching, allowing detection engineers to craft more precise rules. Stay tuned

cyb3rops's tweet image. Teaser: we're working on a new #YARA module to enhance in-memory matching, allowing detection engineers to craft more precise rules. Stay tuned

A few weeks ago I was honored to speak at @labscon_io . Great people, great talks, great venue. I honestly could not suggest any improvements except something closer to CET timezone!


Loading...

Something went wrong.


Something went wrong.