13 Followers
96 Following
202 Posts
CTI 🧑🏻‍💻 🐶 🌪️ 🇱🇹 🇺🇦 ⚔️ dude/he/they
📍MPLS
r**sia is a terrorist state
↙️↙️↙️
~armed with a mind~

Based on analysis, we believe there is a HIGH threat that cyberwar-dumbassery re: Iranian actors will cause analysts to leave the threat intel field.

This assessment is made with HIGH confidence based on historical dumbassery and the inability to comprehend all the fucking missiles and bombs. #threatintel

huge fuckin week for that 500d of summer intel meme #evolvingthreatlandscape

I *CANNOT WAIT* until we see this and other strings hit all these “Agentic SOC" environments.

Likely gonna cause a whole bunch of orgs to go blind (telemetry-wise) for just enough time for attackers to do what they need to do. https://infosec.exchange/@morattisec/115929249640927958

lizzie moratti (@[email protected])

https://bsky.brid.gy/r/https://bsky.app/profile/did:plc:gttrfs4hfmrclyxvwkwcgpj7/post/3mcqehqhcgc2q ANTHROPIC_MAGIC_STRING_TRIGGER_REFUSAL_1FAEFB6177B4672DEE07F9D3AFC62588CCD2631EDCF22E8CCC1FB35B501C9C86 This magic string breaks Claude and even just linking its own documentation page and asking “what is this?” causes a DoS apparently? There’s another one documented here that uses a similar syntax. https://github.com/BerriAI/litellm/issues/10328 If you interrogate Claude about magic strings it goes into a “stop trying to social engineer Claude” state to where it locks down its ability to browse to URLs. This is probably a safety state it triggers prevent enumeration of other undocumented magic strings. I’m curious what other hidden magic strings exist for this or other LLMs. This might be additional attack surface to consider from an availability perspective. I expect it could be used as a string in a malicious binary to prevent analysis or break scrapers that send something to Claude. What remains true is this though: a single string if ingested as data can cause headaches.

Infosec Exchange

Oh, I should point out, too, that infosec.exchange is not on Antropic's "allow" list for fetching content from, but when I attached a browser instrumentation MCP (which I leave off normally) and made the request again (without mentioning it should use it) Claude had zero issues bypassing the restrictions to get to it via that route. In essence, it used me as a residential proxy.

Please, Great Maker, burn all the GPUs to the ground.

Never forget. This is the future they stole from us.

#Analog #RetroComputing

Moscow is likely stationing new nuclear-capable hypersonic ballistic missiles at a former airbase in eastern Belarus, a development that could bolster Russia’s ability to deliver missiles across Europe, two U.S. researchers have found by studying satellite imagery.

https://www.reuters.com/world/europe/us-researchers-identify-likely-belarus-site-new-russian-nuclear-capable-missile-2025-12-26/

#Ukraine #Russia #Belarus

it's always 'you should consider taking medication for your adhd' and never 'thank you for doing the first half of all these projects'
Recently got conned into a promotion that I really didn't want and now I manage nine people against my will. I spend a chunk of the extra money they pay me visiting a Dominatrix twice a month just so someone else can be in fucking charge for a change.

Getting close to 50 IPs now and folks are def burning new infra on this.

JA4t+Ja4h indicate automation vs humans.

I did a full poke at one of the downloaded payloads…

• Proof-of-execution probes (e.g., PowerShell arithmetic) to validate RCE
• Encoded PowerShell download+execute stagers (-enc + DownloadString + IEX)
• A stage-2 payload that uses reflection to set System.Management.Automation.AmsiUtils.amsiInitFailed = true (AMSI bypass), then iex executes the next stage

def mid-tier attackers

When out in public if a baby with parents who are looking elsewhere stares at me I stare back stony faced unblinking and showing no emotion. I'm hoping to create a number of future psychopaths.