@BarryV Profile picture

BarryV

@BarryV

Show me, don't tell me -- Opinions are my own and do not represent those of my employer

Similar User
nick photo

@3dRailForensics

Dan Perez photo

@MrDanPerez

Steve Stone photo

@stonepwn3000

Van photo

@Wanna_VanTa

Willi Ballenthin photo

@williballenthin

Mathew photo

@mittypk

Rufus photo

@rufusmbrown

bk (Ben Koehl) photo

@bkMSFT

⚛️ Marcin Siedlarz photo

@siedlmar

bubbles photo

@bwithnell

Tyler McLellan photo

@tylabs

Aaron Stephens photo

@x04steve

Steve Elovitz photo

@SElovitz

Steve Eckels photo

@stevemk14ebr

Kimberly photo

@tiskimber

BarryV Reposted

Don’t forget you @virustotal collection with #APT45 iocs is available here virustotal.com/gui/collection…


Member Turla signing Javascript malware? Serial Number: cd:fb:13:a3:e6:49:ec:c5:df:95:db:88:ca:c1:3f:fb

Tweet Image 1

BarryV Reposted

One really cool thing we've implemented in this iteration of our graduation process is leveraging @virustotal's Collections to provide IOCS to the community for #APT44 - check those out here: virustotal.com/gui/collection…

Tweet Image 1

BarryV Reposted

Today, Mandiant is sharing research on the GRU’s Disruptive Playbook, drawn from insights into GRU’s full-spectrum cyber operations in Ukraine over the past year. mandiant.com/resources/blog…


BarryV Reposted

Head of Rubrik Zero Labs @stonepwn3000 recently talked to @joetidy of @BBCNews about why it is so rare to hear about Western #CyberAttacks and hacking teams and how the narrative of who the good guys and bad guys are in cyber-space is changing 👇 rbrk.co/43WGGsd


BarryV Reposted

Really excited to see the culmination of some amazing work from some amazing people get released today. A report from @Google TAG, with contributions from friends at @Mandiant, on cyber activity related to the war in Ukraine. @t_gidwani @ShaneHuntley blog.google/threat-analysi…


BarryV Reposted

capa v5.0.0 is out: major improvements for .NET binary analysis, 150 new/updated rules, caching to improve performance standalone and in the IDA Pro plugin, better ELF OS detection, and a lot more. github.com/mandiant/capa/… VirusTotal integration updates are next!


BarryV Reposted

If you have any intel analysis or threat hunting roles, please reach out to @PhreakingGeek You'd be hard-pressed to find anyone more passionate about chasing adversaries than he is. I am broken-hearted to have lost him, but I know he'll make a great impact on a new team.

This post is unavailable.

BarryV Reposted

We welcome @Mandiant's CAPA and GoReSym to our malware analysis suite. CAPA provides valuable TTPs, and GoReSym produces all kind of metadata to analyse GO samples: blog.virustotal.com/2023/01/mandia…

Tweet Image 1

BarryV Reposted

#100DaysofYARA tons of tasty info can be pulled from Macho headers, especially Load commands! Lets get a generic count of LOAD_DYLIB commands to quantify the amount of external libraries are used - no idea if any # is suspicious github.com/100DaysofYARA/…

Tweet Image 1
Tweet Image 2
Tweet Image 3

BarryV Reposted

Mandiant Blog - Turla: A Galaxy of Opportunity mandiant.com/resources/blog… This is Mandiant’s first observation of suspected Turla targeting Ukrainian entities since the onset of the invasion.

In September 2022 Mandiant Managed Defense detected data staging and exfiltration at a Ukrainian organization. Digging into this incident, we discovered QUIETCANARY (aka Tunnus), a suspected Turla Team backdoor, was the source.



BarryV Reposted

What's the technical term for when you've absorbed so much technical debt you're spending all your time addressing support issues rather building?


BarryV Reposted

If we’re gonna haggle/argue over terminology can it please be thrunt.


BarryV Reposted

Mandiant observed a POORTRY sample signed with a Microsoft Windows Hardware Compatibility Authenticode signature. Further analysis led to a larger investigation into malicious drivers signed via the Windows Hardware Compatibility Program. 😱🌶️🔥 mandiant.com/resources/blog…


BarryV Reposted

New from @SentinelOne and @Mandiant: Targeted Attacks Leverage Signed Malicious Microsoft Drivers: 🟣 s1.ai/signed-ms 🟣 mandiant.com/resources/blog…


Loading...

Something went wrong.


Something went wrong.