Marc-Etienne M.Léveillé

218 Followers
54 Following
9 Posts

👋 Hello Mastodon! MontréHack is a bilingual, monthly cybersecurity workshop in #Montreal where challenge designers present their CTF challenges and participants solve them.

👋 Bonjour Mastodon! MontréHack est un atelier mensuel bilingue à Montréal où des créateurs de challenge présentent leurs challenges CTF et où les participants les résoudent.

@warthog9 you should talk to @stgraber, he’s running his own AS too with quite a few gear, in Montreal, but not sure in which datacenter

This week is my last week at @ESET. I am sad to be leaving the awesome @ESETresearch team but also very excited to join Google's Threat Analysis Group next week and continue to research and fight malware at a global scale.

I have learned a lot during my 12 years at ESET, such how complex malware detection engine really are in security software (aka AV). There is a lot of brilliant technology behind it. It’s much, much more complex than the “hash-based signature” people think it is.

I am looking forward to build stuff in Google TAG with new colleagues and wish ESET and its impressively good research team the best for the future, ✌️.

Many congratulations to ESET researcher Marc-Etienne M.Léveillé (@marcetienne), winner of the 2024 Péter Szőr Award for Technical Security Research for his research "Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain"! #vb2024 https://www.virusbulletin.com/conference/peter-szor-award/
Virus Bulletin :: Péter Szőr Award

The Annual Péter Szőr Award for Technical Security Research

🎉 I am really thrilled to have won the 10th Péter Szőr award at @VirusBulletin. Congrats to all the authors of the nominated papers. They are all excellent pieces and know that I highly respect your work. It is very flattering to have our work recognized by our peers. #vb2024

https://infosec.exchange/@VirusBulletin/113248734129035293

Publishing exhaustive malware research paper is a _lot_ of work, and it wouldn't be possible for me without help. I'd like to thank our partners (NHTCU et al.) and the team @ESETresearch for technical and language reviews, as well as designers that render the final result.

If you are curious about our research, and to understand how a botnet of Linux servers has been around for 15 years stealing credit cards and cryptocurrency, and mangling HTTP traffic, the paper is available here: https://www.welivesecurity.com/en/eset-research/ebury-alive-unseen-400k-linux-servers-compromised-cryptotheft-financial-gain/

Virus Bulletin (@[email protected])

Attached: 1 image Many congratulations to ESET researcher Marc-Etienne M.Léveillé (@marcetienne), winner of the 2024 Péter Szőr Award for Technical Security Research for his research "Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain"! #vb2024 https://www.virusbulletin.com/conference/peter-szor-award/

Infosec Exchange
Kyle 'esSOBi' Stone (@essobi) on X

@VicVijayakumar Nothing's a private message when you work for Slack.

X (formerly Twitter)
#ESETResearch releases IPyIDA 2.0, a plugin for IDA Pro that integrates IPython for a better console. Learn about all the new features on Hex-Rays’ blog at https://hex-rays.com/blog/plugin-focus-ipyida/ or read the tl;dr down here 👇 @marcetienne 1/5
Plugin focus: IPyIDA – Hex Rays

On Nov 21st #ESETResearch detected and alerted @_CERT_UA of a wave of ransomware we named #RansomBoggs, deployed in multiple organizations in Ukraine🇺🇦. While the malware written in .NET is new, its deployment is similar to previous attacks attributed to #Sandworm. 1/9
Hey Mastodon! We recently published our APT threat report, looking back at the past few months of threat actor activities monitored by #ESETresearch. Check it out https://www.welivesecurity.com/wp-content/uploads/2022/11/eset_apt_activity_report_t22022.pdf