Jeremy Kirk

@jkirk@infosec.exchange
1.6K Followers
490 Following
671 Posts
Threat intel @ Intel 471. Personal account. Interests: Cybercrime, cyber threat intelligence, OSINT, data breaches, photography. Also produce Intel 471's "Cybercrime Exposed" podcast. #Australia
Bluesky@jkirk.bsky.social
LinkedInhttps://www.linkedin.com/in/jeremykirk/
Podcasthttps://podcasters.spotify.com/pod/show/cybercrimeexposed
Website
Twiiter
AI scraping of original postsI do not consent to my content being used for any LLM or AI training.
This is the first time I've seen privacy used as a marketing argument for eyeglasses. Is Zenni's claim is accurate? Does deflecting infrared light foil facial recognition/AI-based tracking? #infosec
Went out for a mountain bush walk this morning and child #2 spots this delight -- a blue mushroom! We looked for smurfs but unfortunately didn't find any. #Australia
Ep. 8 of Intel 471's Cybercrime Exposed podcast is about Raccoon Stealer, an infamous data-stealing malware whose operator made critical mistakes -- including an ill-timed photo posted by his girlfriend on Instagram -- that led to his downfall. Big thanks to Lead Cybercrime Analyst at Sekoia.io, @crep1x for his insight. Also thanks to Souhail Hammou, a principal reverse engineer at Intel 471, for his analysis of infostealers. Cybercrime Exposed is on Apple and Spotify. Below is a short audio preview plus a link to the episode embedded on our website.
https://intel471.com/resources/podcasts/cybercrime-exposed-podcast-raccoon-stealer
Cybercrime Exposed Podcast: Raccoon Stealer

Intel 471 empowers cybersecurity teams worldwide to be proactive with its TITAN platform and comprehensive coverage into the criminal underground.

Intel 471
Going over the Sydney Harbour Bridge on a rainy day. Taken with a Canon EOS 300 on Ilford HP5+
Big thanks to Google and Mandiant for putting on the outstanding hashtag #RooCon cyber threat intelligence conference yesterday in Sydney (and letting me squeeze in). The speakers and presentations were fantastic. The content was under TLP restrictions so there's not much that can be shared, but broadly it's certainly looking like we're all going to have a busy upcoming year. 😂
Logs often tell a story. Here's an interesting graph showing the how investigators linked Maxim Rudometov with allegedly administering the RedLine and META infostealers. First, he had a big setback not long after launching RedLine when another threat actor connected his previous nicknames he used underground forums. By soft doxing him, investigators were able to research identifiers related to those older nicknames. Essentially, his downfall was (as usual) the re-use of email addresses across various underground forums and legit services. Many roads in investigating cybercrime lead to big tech providers like Apple, Microsoft and Google where threat actors usually have accounts in their real names. Rudometov allegedly re-used an email address for his iCloud account, where investigators found RedLine's code. They also found a RedLine encryption key in his GitHub repo. The criminal complaint has other examples of risky OPSEC, such as using the same IP to administer RedLine as was used for gaming games, iCloud, etc. #infosec
Just finished @josephcox's excellent book Dark Wire, which describes how the FBI set up an encrypted phone device company, Anom, and lured thousands of criminals into using it, gaining visibility into every message they sent. Incredible story, and well reported. #infosec
Best fake #infosec related ad in the print edition of The Onion.
First issue of the @theonion arrived. I think it's the first newspaper I've held in years. 🤣 It's the August issue but hey I live in Australia so nothing gets here fast.
We adopted Winnie, a four-month-old tabby, this morning. She's doing well after a hectic day and settling in. She's a beautiful, super friendly cat and will be a great friend to Ted, our first adoption.