So, there's a Chinese botnet package known as "Destroyer" (破坏者).
It, ironically, can itself be destroyed, thanks to a stack buffer overflow.
I wasn't able to get full RCE, but a jump to "call ExitProcess" should be enough, no? It can be triggered directly after "start DDoS", for even more lulz.
Here's the exploit: https://gist.github.com/Wack0/d0aa7f56d5d044fb918056207d2149b1
And here's a bot sample hash: b17535de8061dce3d6630e92d601ebe1ebac44ed52b3a04a8bb72f6661f23d44
Let's #destroythedestroyer :)
Brilliant <thing on other network we don't talk about> by @Mudge:
https://twitter.com/dotmudge/status/850385568148140033
"This is a brilliant tactic. There are so many others like this because the AV community keeps thinking this is a one-move game... Kudos!"
That definition of the strategy of the AV community is absolutely perfect. Depth: zero.
Twitter sued Customs and Border Protection for trying to unmask one of their pseudonymous alt agency accounts. Within 24 hours of Twitter filing the lawsuit, the government withdrew its subpoena. What happened here?
I explain it all: https://motherboard.vice.com/en_us/article/alt-twitter-account-trump-customs-lawsuit