Kyle Eaton
621 posts


@KyleTDavis1 You’ve always been a joy to work with, and have given me good advice related to work/cyber and anything else I’ve needed help with. I know you’ll thrive wherever you land next
GIF
English

Kyle Eaton retweetet

Proofpoint threat researchers have designed an open-source tool—named PDF Object Hashing—to track and detect the unique characteristics of PDFs used by threat actors... similar to a digital fingerprint.
We use this tool internally to help track multiple threat actors with high confidence, improving attribution in many cases.
The tool has been released in the @Proofpoint Emerging Threats public #GitHub for other defenders to leverage.
Learn more about it here: brnw.ch/21wWSH0
@ET_Labs #PDF #threatdetection #cyberthreat

English

Another great year at @GrrCON! Big props to the staff for all the hard work they do 🫶
English

I’ll be presenting at @GrrCON this year about some weird pdf detection ideas I’ve been messing with. Swing by and tell me your file format
English

@ex_raritas It’s been really nice working with you, and good luck in your next role! 🐜
English

Tomorrow (Friday) will be my last day at Proofpoint after four years on the Threat Research team.
Over that time, I’ve been fortunate to advance research into evolving malware, track infrastructure, uncover adversary techniques, and help shape how threats are understood and countered. I’m grateful for the opportunity, but more so the privilege of working alongside such talented and dedicated peers.
I’ll share more soon about what comes next.
😊💻🧑💻
English

@MalwareUtkonos @greglesnewich Oh that’s really good, especially considering all the other offsets are based from the eocd
English

@0xkyle @greglesnewich Yes, that's the goal. I was getting end locators that belonged to subfiles. Another benefit that I didn't expect, but is logical is that Zip rules can find those executables that use a Zip archive as the overlay if you're using end locator rather than PK magic at offset 0
English

@MalwareUtkonos @greglesnewich I do really like that you’re using the filesize in part of the location check like that, I don’t know if I have any rules that use the filesize in that way.
English

@MalwareUtkonos @greglesnewich Am I right in assuming that’s meant to make sure you’re only reading the eocd of the actual zip file and not any of the sub files? I have some rules where I’ve done something similar, I think it went something like: uint32be(@eocd[#eocd] + whatever) == 0xdeadbeef
English

@greglesnewich @MalwareUtkonos Definitely have to echo how impactful learning file formats was for improving my yara rules. How highly structured the
Zip format is makes rules very fun. The only sample rule I have rn is this old compression ratio one

English

@MalwareUtkonos These are slick and totally inspiring! 🤘
Paging @0xkyle for rules (ab)using the ZIP format
English
Kyle Eaton retweetet

On this DISCARDED episode, we uncover real-world detection wins, explore persistent threats like #TA505 and #Emotet, and dive into the importance of instincts in cybersecurity—because, as our guest puts it, sometimes good detection is all about the vibes. brnw.ch/21wQWWl

English

virustotal.com/gui/file/f2a6f…
Also expecting to see indiandefenceforces[.]link soon
Kyle Eaton@0xkyle
Haven’t seen PDFs yet but new domain popped up: defenceindia[.]link
English

7c8a483f3c745d23db9557479bedbc6e458104c77709edc6907fa108065fc63a
PDF phish
Kyle Eaton@0xkyle
ministryofdefenceindia[.]link does not pass the sniff test.
Français

