269 Followers
139 Following
588 Posts

_security_researcher
_founder_ @barghest

{ disrupting APT, authoritarian gov, surveillance, privacy violations & corporate injustice }

Websitehttps://0x0v1.com
BARGHESThttps://Barghest.asia

This is satire, afaik, but i suppose, highly possible

"Our proprietary AI robots independently recreate any open source project from scratch. The result? Legally distinct code with corporate-friendly licensing. No attribution. No copyleft. No problems."

https://malus.sh/

MALUS - Clean Room as a Service | Liberation from Open Source Attribution

Reminder, VCs don't have the answers: https://www.0x0v1.com/proof-vcs-dont-have-the-answers/
"The Techno-Optimist Manifesto" is proof tech VCs don't have the answers

If you haven't read Marc Andreessen's, founder of the Silicon Valley venture capital firm Andreessen Horowitz (a16z), “manifesto” and want to be utterly bemused by a sea of irony, you should do it. You might also be filled with fear of a dystopian future, like I was. You'll also end

[0x0v1]
Did he miss 4000 years of Hinduism, 2500 years of Buddhism, 2300 years of Stoicism...
Marc Andreessen, proving again that people with Zero Introspection, should have Zero Power.
X is just an ai echo chamber. if your infosec post doesn't contain anything about AI your reach immediately plummets

We found an exploit in #BitChat. A cache poisoning and replay attack that allowed a nearby or malicious mesh participant to DoS, disrupt and degrade mesh operation.The issues have since been patched.

Full write-up: https://barghest.asia/blog/bitchat-cache-poisoning/

BitChat cache poisoning and replay in Bluetooth mesh

BARGHEST found a cache poisoning attack in BitChat and replay flaw in BLE mesh synchronization that enabled durable network disruption before patching.

Barghest
Interesting technique. Obfuscates its string decoder inside android namespace "com .google .android .material .timepicker". That helper XOR-decodes which then concatenates into the C2: http://95.164.86[.]148/dash/index[.]php. #kimsuky
The Coruna loader performs environment validation including kernel build checks and CPU family gating using XNU CPUFAMILY constants (A15/A16 visible in snippet). So execution is restricted to specific Apple SoC generations. The sample I have appears to be a staged loader that validates the device environment before transferring control to a secondary payload. This architecture resembles similarity to Operation Triangulation (iVerify and Google referenced this already), though in OT hardware exploitation logic resides in later stages rather than the initial loader...
@SwampPutty me too 🙏
@SwampPutty i feel like cli work flows are coming back and it's kinda nice . even when I load up Android Studio or VS code it feels gross with all the ai integrations and stuff