joeychennoGG's profile picture. malware researcher, reverse engineer. A conference speaker and trainer such as HITB, VirusBulltin, CodeBlue, HITCON, DeepIntel, etc.

joeychen

@joeychennoGG

malware researcher, reverse engineer. A conference speaker and trainer such as HITB, VirusBulltin, CodeBlue, HITCON, DeepIntel, etc.

joeychen reposted

Although these malware families have historically been associated with campaigns attributed to Naikon or BackdoorDiplomacy, our analysis indicates a connection. blog.talosintelligence.com/how-rainyday-t…


joeychen reposted

New blog post! "Building Casper's Shadow". We discovered and researched the #ShadowPad builder. See how ShadowPad is built 😎👻 nao-sec.org/2024/06/buildi…

nao_sec's tweet image. New blog post! "Building Casper's Shadow". We discovered and researched the #ShadowPad builder. See how ShadowPad is built 😎👻
nao-sec.org/2024/06/buildi…

joeychen reposted

Cisco Talos researchers Chetan Raghuprasad & Joey Che discovered a financially motivated threat actor targeting users in several Asian & Southeast Asian countries. CoralRaider focuses on stealing victims’ credentials, financial data & social media accounts blog.talosintelligence.com/coralraider-ta…

virusbtn's tweet image. Cisco Talos researchers Chetan Raghuprasad & Joey Che discovered a financially motivated threat actor targeting users in several Asian & Southeast Asian countries. CoralRaider focuses on stealing victims’ credentials, financial data & social media accounts blog.talosintelligence.com/coralraider-ta…

joeychen reposted

淮南锋川网络科技有限责任公司 submitted the binary to MS to be signed 96170614bbd02223dc79cec12afb6b11004c8edb8f3de91f78a6fc54d0844622

Carderbee: APT Group uses Legitimate Software in Supply Chain Attack Targeting Orgs in Hong Kong - Cobra DocGuard and legit Microsoft-signed cert used in this activity. Read more: symantec-enterprise-blogs.security.com/blogs/threat-i…

threatintel's tweet image. Carderbee: APT Group uses Legitimate Software in Supply Chain Attack Targeting Orgs in Hong Kong - Cobra DocGuard and legit Microsoft-signed cert used in this activity. Read more: symantec-enterprise-blogs.security.com/blogs/threat-i…


joeychen reposted

2022年6月に新たな攻撃者グループによる日本組織を狙った「サプライチェーン攻撃」を確認しました。 攻撃で利用された4つのマルウェアを中心に、その機能や背後に潜む攻撃者像について紹介しています。ぜひご活用ください。 lac.co.jp/lacwatch/repor… #株式会社ラック #サプライチェーン攻撃


fd8c53670c2dcea06abfe49b364875643f6c499ca77c6a49a63a1ae4364c03c5 d011130defd8b988ab78043b30a9f7e0cada5751064b3975a19f4de92d2c0025 Interesting pdb strings

joeychennoGG's tweet image. fd8c53670c2dcea06abfe49b364875643f6c499ca77c6a49a63a1ae4364c03c5
d011130defd8b988ab78043b30a9f7e0cada5751064b3975a19f4de92d2c0025
Interesting pdb strings

joeychen reposted

🔥New from #SentinelLabs! Chinese-aligned APT group Moshen Dragon caught side-loading #malware through multiple #AV products to infect telecoms sector. By Joey Chen and @AmitaiBs3. Read the blog: sentinelone.com/labs/moshen-dr… #moshendragon #cybersecurity #plugx #shadowpad


Verifying myself: I am joey_chen222 on Keybase.io. jt8RW_nlKBlThsZc4H2NnzUdrFD4uWYnfwxj / keybase.io/joey_chen222/s…


joeychen reposted

Chinese espionage tool exploits vulnerabilities in 58 widely used websites... Fifty-seven of the sites are popular Chinese portals, while the last is the site for US newspaper, the New York Times. therecord.media/chinese-espion… via @TheRecord_Media


joeychen reposted

joeychen reposted

Check out our latest research about similarities between ShadowPad and PlugX APT-backdoors. We analysed malware samples from our customer's infected PCs and some other ones and highlithed some common features news.drweb.com/show/?i=14048&…


joeychen reposted

New post: The U.S. Justice Department charged 5 members of a Chinese state-sponsored group known as #APT41 for hacking over 100 institutions worldwide. Last May, @TrendMicro also connected the group to ransomware attacks on Taiwanese organizations. trendmicro.com/en_us/research…


joeychen reposted

.@TrendMicro cyberthreat researcher @joeychennoGG breaks down #TropicTrooper 's use of USBferry at #HITCON2020. More about this topic: bit.ly/2zubhEb

TrendMicroRSRCH's tweet image. .@TrendMicro cyberthreat researcher @joeychennoGG breaks down #TropicTrooper 's use of USBferry at #HITCON2020. More about this topic: bit.ly/2zubhEb

joeychen reposted

My new AMSI bypass script based on Matt Graeber @mattifestation 'amsiInitFailed' script. With a little math 0/59 AV detects as malicious in 2020. Happy pentesting. @kmkz_security

TihanyiNorbert's tweet image. My new AMSI bypass script based on Matt Graeber @mattifestation 'amsiInitFailed' script. With a little math 0/59 AV detects as malicious in 2020. 
Happy pentesting. 

@kmkz_security

joeychen reposted

『DarkHotel has been linked to both Higaisa and StarCruft, all of them have some connection to South Korea in one way or another.』🤔 Deep-dive: The DarkHotel APT blog.bushidotoken.net/2020/06/deep-d…


amazing project

Proto 6/10: Copy printed text to desktop with AR+ML Code: github.com/cyrildiagne/ar… Book: Neurones, les intelligences simulées, Frédéric Migayroux & al (Editions Hyx 2018 @centrepompidou) #ML #AR #AI #AIUX #ARCore #ARKit #WebXR Technical Insights: ↓



Loading...

Something went wrong.


Something went wrong.