coldshell's profile picture. Malware Hunter, Reverser and Club Mate addict

coldshell

@coldshell

Malware Hunter, Reverser and Club Mate addict

coldshell reposted

Success! Synacktiv was able to execute a heap-based buffer overflow in the kernel triggered via WiFi and leading to RCE against the Wyze Cam v3. They earn $15,000 and 3 Master of Pwn points. #Pwn2Own

thezdi's tweet image. Success! Synacktiv was able to execute a heap-based buffer overflow in the kernel triggered via WiFi and leading to RCE against the Wyze Cam v3. They earn $15,000 and 3 Master of Pwn points. #Pwn2Own
thezdi's tweet image. Success! Synacktiv was able to execute a heap-based buffer overflow in the kernel triggered via WiFi and leading to RCE against the Wyze Cam v3. They earn $15,000 and 3 Master of Pwn points. #Pwn2Own
thezdi's tweet image. Success! Synacktiv was able to execute a heap-based buffer overflow in the kernel triggered via WiFi and leading to RCE against the Wyze Cam v3. They earn $15,000 and 3 Master of Pwn points. #Pwn2Own

coldshell reposted

Our team published a post about the #3cx supply chain attack. We describe the Windows & the MacOS backdoors. The timeline: the GitHub repo on December 7 & the infrastructure in November... Few months later a malicious update was sent to the customers : volexity.com/blog/2023/03/3…


coldshell reposted

Watchout! CVE-2023-22809 on Sudo was patched today to prevent a privilege escalation on sudoedit. Read the security advisory by @aevy__ and @v1csec: synacktiv.com/sites/default/…

Synacktiv's tweet image. Watchout! CVE-2023-22809 on Sudo was patched today to prevent a privilege escalation on sudoedit. Read the security advisory by @aevy__ and @v1csec: synacktiv.com/sites/default/…

coldshell reposted

Let the bees out! Escaping from the bhyve hypervisor by @abu_y0ussef 🐝 synacktiv.com/publications/e…


coldshell reposted

I published a new article about an ESXi encryptor we found during a case. Let me know if you found a similar sample and are willing to share! #dfir #Ransomware

During an incident response, our CSIRT discovered an ESXi ransomware called PrideLocker, based on Babuk ESX encryptor whose source code leaked in 2021, with new additions and obfuscation. Our latest blog post provides an in-depth analysis of PrideLocker. synacktiv.com/publications/p…



coldshell reposted

If you see two guys wearing Synacktiv t-shirts with big antennas, you should turn around with your @Tesla! 0-click RCE demonstration on a real vehicle, with CAN messages sent to switch on headlights, wipers and trunk 😎 #Pwn2Own


coldshell reposted

🔊 For #BlackAlps day 2, @_p0ly_ tells us about his journey into pwning the Sonos One Speaker!

Synacktiv's tweet image. 🔊 For #BlackAlps day 2, @_p0ly_ tells us about his journey into pwning the Sonos One Speaker!

coldshell reposted

#BlackAlps is starting! @netsecurity1, @cleptho and @abu_y0ussef are on stage to present their work on the Canon printer pwning during last year #Pwn2Own.

Synacktiv's tweet image. #BlackAlps is starting! @netsecurity1, @cleptho and @abu_y0ussef are on stage to present their work on the Canon printer pwning during last year #Pwn2Own.

coldshell reposted

Hey :) New blog post detailing Raccoon V1 management infrastructure (victim storage location, Telegram update server, etc), MaaS infrastructure location + link to CC2BTC marketplace. Once again, feedback warmly-welcomed 😄


coldshell reposted

Remote Admin tools are being more and more abused by threat actors. In our latest blogpost, @ektoplasma_ wondered what traces could be leveraged during investigations regarding some usual suspects: TeamViewer, AnyDesk, Atera, and SplashTop. synacktiv.com/publications/l…


coldshell reposted

Yes - New work released o/ <3

1st paper from my friend and @mandiant colleague @fumik0_ ! 🥰 From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind. 👇 mandiant.com/resources/blog… #malware

Requiem_fr's tweet image. 1st paper from my friend and @mandiant colleague @fumik0_ ! 🥰
From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind. 👇
mandiant.com/resources/blog…
#malware


coldshell reposted

Ever wanted to exploit a PHP file inclusion without having a file upload? Follow @_remsio_'s journey to discover PHP filter chains, ensuring they work properly, and transforming them into a tool. You can now convert almost any file inclusion to RCE! synacktiv.com/publications/p…


coldshell reposted

Our paper on Earth Berberoka is finally out ! It contains analysis of multiple Windows, Linux and Mac malware families (PuppetLoader, oRAT, PlugX, gh0st, Xnote, Hellobot, Pupy, Reptile...), 3 different infection vectors, links to multiple known #APT groups documents.trendmicro.com/assets/white_p…


coldshell reposted

Our ninjas are ready for their talk about hacking the Canon printer at @Cansecwest. 😄

Synacktiv's tweet image. Our ninjas are ready for their talk about hacking the Canon printer at @Cansecwest. 😄

coldshell reposted

Amazing demonstration by @_p0ly_ and @vdehors! 0-click RCE on the @Tesla infotainment in less than a minute!

Success! To kick things off for #Pwn2Own 2022 Day 2 in style, David BERARD and Vincent DEHORS from @Synacktiv demonstrated code execution on the @Tesla infotainment system resulting in a arbitrary file write and a switch unlock. #P2O15



coldshell reposted

Tomorrow during #CanSecWest, our ninjas @abu_y0ussef, @netsecurity1 and @cleptho will tell you how they compromised the Canon printer during the previous #Pwn2Own! cansecwest2022.sched.com/event/ztKJ/the…


coldshell reposted

Mehdi currently heading to the famous cybersecurity conference CanWildWest 🫣

Success! To kick things off for #Pwn2Own 2022 Day 2 in style, David BERARD and Vincent DEHORS from @Synacktiv demonstrated code execution on the @Tesla infotainment system resulting in a arbitrary file write and a switch unlock. #P2O15



coldshell reposted

The slides of our Botconf talk are now online. They contain infection vectors, a focus on a complex malware family sharing a flawed RC4 implementation with TigerPlug malware, victimology and attribution hints. Let me to know if you track this #APT group botconf.eu/wp-content/upl…

thehellu's tweet image. The slides of our Botconf talk are now online. They contain infection vectors, a focus on a complex malware family sharing a flawed RC4 implementation with TigerPlug malware, victimology and attribution hints. Let me to know if you track this #APT group botconf.eu/wp-content/upl…
thehellu's tweet image. The slides of our Botconf talk are now online. They contain infection vectors, a focus on a complex malware family sharing a flawed RC4 implementation with TigerPlug malware, victimology and attribution hints. Let me to know if you track this #APT group botconf.eu/wp-content/upl…
thehellu's tweet image. The slides of our Botconf talk are now online. They contain infection vectors, a focus on a complex malware family sharing a flawed RC4 implementation with TigerPlug malware, victimology and attribution hints. Let me to know if you track this #APT group botconf.eu/wp-content/upl…
thehellu's tweet image. The slides of our Botconf talk are now online. They contain infection vectors, a focus on a complex malware family sharing a flawed RC4 implementation with TigerPlug malware, victimology and attribution hints. Let me to know if you track this #APT group botconf.eu/wp-content/upl…

coldshell reposted

A few minutes ago at BotConf, I shared a script to import and export Twitter blocklists. I use it to block advertisers on the platform! Find my code and current list here: github.com/JusticeRage/tw…


Loading...

Something went wrong.


Something went wrong.