Advertisement · 728 × 90

Posts by Andrew Northern

Fantastic night

1 year ago 1 0 0 0
Justice Department and FBI Conduct International Operation to Delete Malware Used by China-Backed Hackers The Justice Department and FBI today announced a multi-month law enforcement operation that, alongside international partners, deleted “PlugX” malware from thousands of infected computers worldwide. A...

The Justice Department and FBI announced a law enforcement operation that, alongside international partners, deleted “PlugX” malware from thousands of infected computers worldwide implanted by Chinese hackers known as “Mustang Panda” or “Twill Typhoon."
www.justice.gov/opa/pr/justi...

1 year ago 8 6 0 1

I wish that I would have known this or have had exposure to this. I was shocked at how defensive I became the first time you edited my work. Sorry for that. I think I am growing and have grown 🌱

1 year ago 1 0 0 0
Post image

Dear Threat Researchers!
We wish you a fruitful year full of impactful research! Stay healthy, stay happy and don't stop being awesome! 🥂🕺💃🎇🎆 #HappyNewYear2025 #CTI #PIVOTcon25 #ThreatResearch #ThreatIntel

1 year ago 9 3 0 0

Day 1 of giving the murder of crows 🐦‍⬛ a present 🎁 until we are friends.

Today’s present: Part of a Hash Brown

1 year ago 1 0 0 0

Happy new year!

1 year ago 1 0 0 0

Joe knows ball

1 year ago 0 0 0 0
Post image
1 year ago 0 0 0 0
Advertisement
Post image
1 year ago 0 0 0 0
Preview
GitHub - google/vxsig: Automatically generate AV byte signatures from sets of similar binaries. Automatically generate AV byte signatures from sets of similar binaries. - google/vxsig

A while back, I made a thing that turns #BinDiff matches into YARA rules: https://github.com/google/vxsig #100DaysOfYARA

3 years ago 10 4 0 0
Post image
1 year ago 6 0 0 0
Preview
Sweet Tea Polyphia, Aaron Marshall · Muse · Song · 2014

Man I love Polyphia.

open.spotify.com/track/0BE86K...

1 year ago 1 0 0 0
Post image Post image
1 year ago 0 0 0 0
Preview
Behind the Binary by Google Cloud Security Podcast · Josh Stroschein · Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Jos...

🎙️ I'm excited to announce the launch of a new podcast - Behind the Binary! #BehindTheBinary focuses on the stories of the people, technology, and events that have shaped the world of reverse engineering. You can find it on Spotify👇

open.spotify.com/show/3yWgmIu...

1 year ago 9 3 0 0
Preview
Scams, Smishing, and Safety Nets: How Emerging Threats Catches Phish Podcast Episode · DISCARDED: Tales From the Threat Research Trenches · 11/15/2024 · 51m

New episode of DISCARDED where I chat with Genina Po about how she catches phish 🎣

We dive into how to write detections, what to hunt for when finding phish kits, and some of her recent research on phishing scams. Tune in wherever you get your podcasts!

Apple: podcasts.apple.com/us/podcast/d...

1 year ago 12 4 1 0

Such a thorough analysis of #RaspberryRobin in this article that taught me a lot 👇 😂

1 year ago 7 2 1 0
Advertisement
Post image Post image Post image

2024-11-25 (Monday): My thanks to the criminals who email malware directly to my inbox. This one is #AgentTesla using #FTP for #data_exfiltration. Sends to FTP server approx every 10 minutes.

Attached disk image file: bazaar.abuse.ch/sample/7a11d...

Extracted EXE: bazaar.abuse.ch/sample/2362b...

1 year ago 7 3 1 0

Oh hey I found you on here.

1 year ago 2 0 0 0

What if I’m just extremely eager to check in a few thousand times?

1 year ago 2 0 0 0

Hey :) 👋

1 year ago 1 0 0 0
Post image

@hultquist.bsky.social hitting us with the hottest phishing lure of all time

1 year ago 6 0 1 0

🤝

1 year ago 1 0 0 0
Preview
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape | Proofpoint US What happened  Proofpoint researchers have identified an increase in a unique social engineering technique called ClickFix. And the lures are getting even more clever.

www.proofpoint.com/us/blog/thre...

1 year ago 2 0 0 0

💪

1 year ago 0 0 0 0

So stoked

1 year ago 1 0 0 0
Post image

Almost embarrassed to post this, but I've always used Fiddler or Burp for capturing things like this...

I didn't have admin rights and was trying to capture network traffic from a pop-up, so Dev Tools wasn't working

Apparently this is built into Chrome/Edge! So cool :)

edge://net-export/

1 year ago 187 45 15 3
Advertisement

Thanks brother

1 year ago 1 0 0 0

Man I used AFLOP for years. Makes me miss it.

1 year ago 0 0 0 0

Trying to rebuild my following here. Tag other security researchers and professionals in the comments please. I’ll follow back :)

1 year ago 4 0 3 0