How did I become a wealthy hedge fund manager when I was only 19, you ask?
-I worked hard.
-I didn't cut corners.
-I murdered a wealthy hedge fund manager and stole his identity.
There are no shortcuts in life.
A COMPUTER CANNOT FIND OUT
THEREFORE A COMPUTER MUST NEVER BE ALLOWED TO FUCK AROUND
(gendigital.com) Group Theory in the Wild: A Deep Dive into Bedep Malware's Mathematically Sophisticated Domain Generation Algorithm
Bedep malware leveraged a mathematically advanced DGA using Euro FX rates from the European Central Bank, rendering C2 domains unpredictable until publication. This technique, rooted in group theory and number theory, significantly hindered preemptive sinkholing or blocking efforts.
In brief - Bedep, an ad-fraud botnet delivered via Angler EK (CVE-2015-0311), used a sophisticated DGA seeded with real-time ECB foreign exchange rates. This approach prevented pre-computation of C2 domains, complicating defensive measures. Active globally (excluding Russia), it infected ~82K IPs.
Technically - Bedep’s DGA fetches UTC time and ECB FX rates, parsing up to 48 currency values to seed a cyclic subgroup walk modulo large primes. Using precomputed primes (p) and subgroup orders (q), it performs modular exponentiation (seed = pow(seed, step, p)) to generate collision-free domains. Domains are constructed via multiply-XOR-shift operations on group elements, currency rates, and codes, producing 12–18 character .com domains. Seven config variants generated 50 domains weekly, each leveraging primitive root searches and smooth factorization of p-1.
Source: https://www.gendigital.com/blog/insights/research/the-group-theory-inside-bedeps-dga
It really happened. John Ternus is Apple's new CEO.
Letter from Tim Cook: https://www.apple.com/community-letter-from-tim/
The internet changes before the advisory drops. New from GreyNoise: activity surges preceded 33 CVEs across 16 vendor families with a median 11-day lead. The pattern holds up to rigorous testing.
From the same author as BlueHammer we now have RedSun.
This works ~100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server 2019+ with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled. Any system that has cldapi.dll should be affected.