Andreas Klopsch

@hackingump1@infosec.exchange
57 Followers
16 Following
70 Posts

Ever heard about RedVDS? A criminal marketplace selling illegal software and services that facilitated and enabled cybercrime.

Recently, Microsoft's Digital Crimes Unit (DCU) facilitated a disruption of RedVDS infrastructure and related operations.

https://www.microsoft.com/en-us/security/blog/2026/01/14/inside-redvds-how-a-single-virtual-desktop-provider-fueled-worldwide-cybercriminal-operations/

#infosec #cybersecurity #digitalcrime #cybercrime

Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations | Microsoft Security Blog

Microsoft’s investigation into RedVDS services and infrastructure uncovered a global network of disparate cybercriminals purchasing and using to target multiple sectors. In collaboration with law enforcement agencies worldwide, Microsoft’s Digital Crimes Unit (DCU) recently facilitated a disruption of RedVDS infrastructure and related operations.

Microsoft Security Blog

Samplepedia update: Users can submit their own images with the samples and there is a platform field.

https://samplepedia.cc

IDA 9.3: Practical Improvements to the Type System

IDA 9.3 improves the type system: parse Objective-C headers directly, cleaner exports, and full round-trip types without losing structure.

I have created a website, where you can share your sample analysis (via links or posts) and search samples for training based on tags and difficulty.

If you write analysis blogs, you can share them there.
https://samplepedia.cc

I'll be at #39c3 this year. Interested in anything malware analysis or podcasting about cyber. I help maintain #malshare if that's your cup of tea.

RE: https://infosec.exchange/@larsborn/115786127689710651

Speaking of which: I will also.be at #39c3, in close vicinity of this gentleman. I can offer some cyber of my own, #BinaryRefinery , or classically, math & crypto stuff.

Watch software developers. I mean *really* watch them.

When they say they spent an hour "writing code", they've actually spent most of that hour *reading* code and *thinking* about it.

Wanna boost your developer productivity?

* Write code that's easier to understand

* Get better at understanding code

More code ain't gonna help here.

🚨 RIFT Update 🚨

Improved rustc compiler detection ✅ Fixed bugs causing incorrect FLIRT signatures for nightly builds 🛠️ Plus, multiple stability fixes! We’re making RIFT easier to use—big features coming soon 😎

👉 https://github.com/microsoft/RIFT

#RIFT #rust #microsoft #infosec

🚨 Announcing 🚨 Hackers on the Hill - Colorado call for participation. (long post, please read, boost, and share widely!)

For the first time, this event will be held at a state capitol, here in Denver. We are working to recruit participants who might also be attending the Wild West Hackin' Fest conference in February.

What is Hackers on the Hill? The event involves people who study or work in the technology or cybersecurity field, coming to the capitol to engage directly with lawmakers, their staff, and/or the staff of state committees.

The goal of the event is to provide a nonpartisan pool of cybersecurity experts to engage in dialogue with elected officials and their staff, in order to answer any questions they might have about cybersecurity, digital privacy, or technology policy that may be under consideration in the coming year.

This is an effort to help educate and provide guidance, through mediated conversations, offered by very experienced people who simply want to ensure that lawmakers have access to accurate and relevant information to help them guide their decision-making.

You may (or may not) be aware that Colorado state lawmakers have been at the forefront of legislation that connects directly with this effort; In past years, the state has passed legislation to promote the right to repair, to prevent various forms of abusive practices by users of generative AI products, and to protect the integrity and security of Colorado's elections. This year, there will be several bills under consideration that touch on various aspects of what we work on, which makes this a timely and relevant topic.

For this event, we are looking for participants with relevant experience in cybersecurity, data privacy, information assurance, enterprise network policy deployment, incident response, or threat investigations...or anyone else who self-identifies as a hacker and seeks to find creative, out of the box solutions to complex technical problems as part of their work or education.

An ideal candidate has no particular agenda, other than a strong motivation to keep people safe and data secure, and for lawmakers to get information that does not push a particular business interest. If you currently or formerly worked as a paid lobbyist, you're unfortunately not the right person for this event, as we have a strict no-shilling policy. We're looking for infosec professionals or students, willing to give half a day of time and energy to help people in positions of authority to understand the implications of various policy considerations.

Does that sound like you? If it does, please fill out our call-for-participation form: https://forms.gle/d7s9EjbFece9xMqg8

#HackersOnTheHill #COpolitics #TechPolicy #hackers #cybersecurity #infosec #policy

Hackers on the Hill - Colorado participant interest form

The Elect More Hackers organization, in collaboration with BSides Boulder, BoulderSec, and Wild West Hackin' Fest, are in the planning stages for a Hackers On The Hill event at the state capitol in Denver, on either February 9 or 10, 2026, prior to the start of WWHF. We want to know a bit about your experience and background, and why you would like to be a part of this event. Hackers On The Hill is an opportunity to meet with staffers who work with Colorado lawmakers and/or staff for committees, to answer their questions and have a friendly discussion about topics where the hacking/information security community could provide insight that is otherwise unavailable or hard to obtain. We are looking for anyone who self-identifies as "hacker" or who otherwise works, volunteers, or is a student in an information security or technology field and who has an interest in engaging with lawmakers or staffers in dialogue on technology policy. If you're open to being involved in these kinds of conversations, you're in the right place. It is important to note that this is a non-partisan event, and that for the purposes of this event, we are open to meeting with lawmakers or staffers who represent any political party for respectful conversations about, specifically, where technology intersects with policy. This is as much about listening as it is about talking. It's also possible that we may not be able to accommodate everyone who wants to engage in a small meeting, in which case we will work to schedule an alternative event that you can participate in. If there are any conflicts you anticipate with that arrangement, please let us know by emailing HotH@electmorehackers.com. We do not market your information. Data collected through this form will only be used by the organizing committee behind this event, and will not be used for any purpose other than to coordinate Hackers On The Hill - Colorado participation. We may need to provide a list of attendees in advance to the Colorado State Patrol (CSP), who operate security for the state capitol, which the only reason we ask for your legal name that appears on a government issued photo ID. This is the first time this event will take place at a state capitol, and the first time we are organizing this event itself, so please keep an open mind and bear with us as we work through our growing pains.

Google Docs
🛑 “Think before you paste.”
ClickFix exploits trust by packaging harmful commands as quick fixes. A few seconds of caution can prevent a full compromise.
Details: https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/
Think before you Click(Fix): Analyzing the ClickFix social engineering technique | Microsoft Security Blog

The ClickFix social engineering technique has been growing in popularity, with campaigns targeting thousands of enterprise and end-user devices daily. This technique exploits users’ tendency to resolve technical issues by tricking them into running malicious commands. These commands, in turn, deliver payloads that ultimately lead to information theft and exfiltration.

Microsoft Security Blog