Posts are my own and do not reflect my employer.
mlget | http://github.com/xorhex/mlget |
blog | https://blog.xorhex.com |
twittodon | https://twittodon.com/share.php?t=xorhex&m=xorhex@infosec.exchange |
mlget | http://github.com/xorhex/mlget |
blog | https://blog.xorhex.com |
twittodon | https://twittodon.com/share.php?t=xorhex&m=xorhex@infosec.exchange |
In 3 days, a slick new UK edition of Sandworm comes out with a new cover and new foreword that aims to capture in a few pages the events of the 5+ years since the book first published: www.amazon.co.uk/Operation-Sa...
The publisher has tweaked the title to "Operation Sandworm" for UK reasons I don't entirely understand, but it's the same book, and hopefully will now reach a new audience.
https://www.amazon.co.uk/Operation-Sandworm-Hunt-Kremlins-Invisible/dp/1800963130
For those who are interested, I recently did a live session demoing Helix, my new go-to text editor, for members of @thetaggartinstitute community. Enjoy!
The slides from our @recon talk, "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" (CC @nicolodev are now online!
Slides: https://synthesis.to/presentations/recon25_mba_obfuscation.pdf
Matt Pahl and I are doing a webinar on defining ICS Malware, its distinction from IT threats, and how we search for it using different OT detection strategies. It's a follow-up to the ICS Malware definition work. Hope to see you there!
Registration link:
https://hub.dragos.com/webinar/what-is-ics-malware-how-we-detect-it
As malware authors increasingly adopt .NET for its ease of development and stability, they rely on sophisticated obfuscation techniques to thwart analysis. Traditional static deobfuscation approaches often fail against modern protections that incorporate runtime integrity checks. This presentation introduces a framework that leverages .NET profilers to perform dynamic binary instrumentation at the MSIL level. We demonstrate how this approach can bypass dynamic checks in obfuscation schemes, extract encrypted strings, and trace execution flows—all without modifying the original binary. Through real-world case studies and live demonstrations, we show how this technique provides reverse engineers with a powerful new tool to analyze obfuscated .NET malware.
Busy Week!
Grateful to SANS ICS for hosting my talk on ICS Malware. It was a great experience.
We released our whitepaper on the subject ( https://www.dragos.com/resources/whitepaper/ics-malware-definition/ ).
We also got word that my talk with Sam Hanson on assessing ICS threats was accepted at Defcon ICS village. Hope to see you there!
https://github.com/alexander-hanel/pwinfected
For anyone else tired of having to start a VM to download a file.
#mlget has been updated - your 1 stop shop for finding malware across different services!
Grab an updated copy at https://github.com/xorhex/mlget/releases/tag/v3.4.2
Happy to add additional services if folks know of more!
Some services I no longer have access to for testing - see the Alt text for more info.