Will

12.9K posts

Will banner
Will

Will

@BushidoToken

Senior Threat Intel Advisor @TeamCymru | Co-founder @CuratedIntel | Co-author @SANSForensics FOR589 | Co-founder @BSidesBournemth | @darknetdiaries #126: REvil

🇬🇧 Katılım Mart 2013
3.4K Takip Edilen37.9K Takipçiler
Will
Will@BushidoToken·
Akira is the worst ⚠️ - Akira accounted for >40% of At-Bay’s claims whose ransom demands averaged $1.2 million 💰 - 60% of Akira victims had a leading endpoint detection and response tool deployed, and were breached anyway Report: (insurancebusinessmag.com/us/news/cyber/…) 🧵2/3
English
1
2
12
2.1K
Will
Will@BushidoToken·
Useful & interesting stats out of the cyber insurance firm At-Bay. They released their 2026 Annual Report, which draws from more than 6,500 claims 💰 - 73% of ransomware attacks began with a VPN - SonicWall is the most-targeted VPN, linked to 27% of ransomware claims 🧵1/3
English
2
19
55
7.6K
Will
Will@BushidoToken·
@bettersafetynet Maybe 😂 but I do find myself eye-rolling when I am greeted with these cover photos and wonder if thy should be discouraged. Call me a corpo, but I’d prefer to see a CTI team’s own logo so I know who to attribute the research to.
English
1
0
3
351
Mick Douglas 🇺🇦🌻
Mick Douglas 🇺🇦🌻@bettersafetynet·
@BushidoToken Ever think the authors are just salty they're not allowed to make stickers? Cause that's the energy I get from the unrestricted stuff I see TBF: some are kinda cool, but I do worry it'll be a fluff report. I want substance, not logos.
English
1
0
2
416
Will
Will@BushidoToken·
I’m not gonna lie, TLP restricted CTI reports with massive AI-generated cover pages of scary terminators from Russia & cyber skeletons from China lose all seriousness to me 😂
English
5
5
88
9.1K
Will
Will@BushidoToken·
This ‘fast16’ report was super interesting, fascinating Western-aligned sabotage malware. Reminded me of when the 🇨🇳 MSS accused the 🇺🇸 NSA of infiltrating the national time centre, to disrupt comms networks, financial systems, and power supply (reuters.com/world/china/ch…)
Andy Greenberg (@agreenberg at the other places)@a_greenberg

A newly decoded piece of sabotage malware called Fast16, created before Stuxnet, was made to silently tamper with calculations in research and engineering software. Likely created by the US or an ally, and possibly used against Iran's nuclear program. wired.com/story/fast16-m…

English
0
13
84
14.4K
Will
Will@BushidoToken·
Very interesting report on a long-running targeted phishing campaign (from Jan 2017 and Dec 2021) attributed to a 🇨🇳 Chinese state actor. Great to see more government orgs like NASA stepping forward to disclose the TTPs they observe in reality. Hopefully more will follow suit.
NASA Office of Inspector General@NASAOIG

When a Chinese national impersonated U.S. researchers to access sensitive NASA aerospace software, our cyber investigators tracked him down and exposed his ruse. Read how we investigate export control violations to protect national security: go.nasa.gov/48SPCmX

English
0
3
27
3.8K
Will
Will@BushidoToken·
A breach affecting France Titres 🇫🇷 was disclosed, affecting 11.7 million people 🔥 Agence Nationale des Titres Sécurisés (ANTS), recently rebranded as France Titres, is the French agency responsible for issuing passports, IDs, driving licenses, and vehicle registrations… 👇
Gouvernement@gouvernementFR

11,7 millions de comptes concernés. ⚠ On fait le point sur l’incident de sécurité ayant touché l’Agence nationale des titres sécurisés. ⬇ info.gouv.fr/actualite/fran…

English
0
1
3
2.3K
Will
Will@BushidoToken·
@HackingLZ You? Definitely not
English
0
0
2
276
Will
Will@BushidoToken·
CTI folks in general do need to be more careful around what they share as they are seen as a trusted source, I am conscious of that myself, thus try to avoid blindly reposting. I don’t see the point of mass reposting myself, I do try to add my thoughts on the news to be helpful.
MalwareHunterTeam@malwrhunterteam

In recent weeks, more and more people retweeting or sharing shit from this BreakGlass AI thing... That in itself is a sad thing... but - unfortunately - not really surprising. Until now, I didn't said anything about this publicly. But today, after seeing @JRoosen retweeted a tweet sharing that "quality" article + the "Official Twitter page of the 780th Military Intelligence Brigade (Cyber)" account tweeted that article, I have to ask: what the fuck is going on? Like, random people sharing random things is a thing... but more and more supposedly knowledgeable (in relation to malware/reversing/etc I mean, of course) people, and some also who not only supposedly, but seriously have knowledge are sharing these shits is not great, to say it nicely... Anyway, the only reason I looked at that article was because when I saw the title containing "a Cardiff University GovRoam Relay", I was like "that could be something interesting if it's true, so let's just quickly look at the article and see if somehow it's true this time". So looked, and of course it turned out that it is wrong. The article says right after "The Cardiff University Connection" that "This is the finding that prompted this writeup." - so the most important thing in the whole article is wrong. The C2 IP (so not a domain, but an IP) of that sample is this: 151.242.152[.]131 - it has absolutely nothing to do with Cardiff University. Also the article mentions 3 ports for that. The first two are clearly wrong, and about the third one I have no idea at all. The right base port is 4408, with a sandbox also showing traffic on port 4409 too. 😫

English
2
1
37
4.8K
Apurv
Apurv@ASG_Sc0rpi0n·
I’m excited to join @Meta as a Security Analyst on the Anti-Scraping Investigations team. I look forward to leveraging all-source analysis to combat platform abuse and protect user data across the entire Meta ecosystem. #newjob #metamate #security
Apurv tweet media
English
13
2
93
6K
Will
Will@BushidoToken·
For a ransomware gang that only appeared last September they have been extremely active. The level of their tools & TTPs is reminiscent of the likes of LockBit, Conti, and ALPHV/BlackCat. The Gentleman seems to be either a rebrand or a new brand created by ransomware veterans.
Will tweet media
Check Point Research@_CPResearch_

Rare glimpse behind the 2nd most dangerous RaaS for 2026, publicly claiming 225+ victims. CP<r> shares behind-the-scenes details that reveal the real number is potentially over 1,570 victims. research.checkpoint.com/2026/dfir-repo…

English
1
16
76
12.4K
Will
Will@BushidoToken·
More info from the Vercel CEO, the breach was caused by Context[.]ai 🔥 x.com/rauchg/status/…
Guillermo Rauch@rauchg

Here's my update to the broader community about the ongoing incident investigation. I want to give you the rundown of the situation directly. A Vercel employee got compromised via the breach of an AI platform customer called Context.ai that he was using. The details are being fully investigated. Through a series of maneuvers that escalated from our colleague’s compromised Vercel Google Workspace account, the attacker got further access to Vercel environments. Vercel stores all customer environment variables fully encrypted at rest. We have numerous defense-in-depth mechanisms to protect core systems and customer data. We do have a capability however to designate environment variables as “non-sensitive”. Unfortunately, the attacker got further access through their enumeration. We believe the attacking group to be highly sophisticated and, I strongly suspect, significantly accelerated by AI. They moved with surprising velocity and in-depth understanding of Vercel. At the moment, we believe the number of customers with security impact to be quite limited. We’ve reached out with utmost priority to the ones we have concerns about. All of our focus right now is on investigation, communication to customers, enhancement of security measures, and sanitization of our environments. We’ve deployed extensive protection measures and monitoring. We’ve analyzed our supply chain, ensuring Next.js, Turbopack, and our many open source projects remain safe for our community. The recommendation for all Vercel customers is to follow the Security Bulletin closely (vercel.com/kb/bulletin/ve…). My advice to everyone is to follow the best practices of security response: secret rotation, monitoring access to your Vercel environments and linked services, and ensuring the proper use of the sensitive env variables feature. In response to this, and to aid in the improvement of all of our customers’ security postures, we’ve already rolled out new capabilities in the dashboard, including an overview page of environment variables, and a better user interface for sensitive env var creation and management. As always, I’m totally open to your feedback. We’re working with elite cybersecurity firms, industry peers, and law enforcement. We’ve reached out to Context to assist in understanding the full scale of the incident, in an effort to protect other organizations and the broader internet. I also want to thank the Google Mandiant team for their active engagement and assistance. It’s my mission to turn this attack into the most formidable security response imaginable. It’s always been a top priority for me. Vercel employs some of the most dedicated security researchers and security-minded engineers in the world. I commit to keeping you updated and rolling out extensive improvements and defenses so you, our customers and community, can have the peace of mind that Vercel always has your back.

English
0
0
0
1.3K
Will
Will@BushidoToken·
Vercel, the cloud popular platform to deploy apps, has been breached 🔥 My quick advice for threat hunters & IR folks: Look in your logs for any comms to *.vercel[.]app sites ⚠️ If you see high comms counts, then there may be a software/app exposure to this breach 🔍
Vercel@vercel

We’ve identified a security incident that involved unauthorized access to certain internal Vercel systems, impacting a limited subset of customers. Please see our security bulletin: vercel.com/kb/bulletin/ve…

English
3
11
38
7.9K