Jeremy Wiedner

231 posts

Jeremy Wiedner banner
Jeremy Wiedner

Jeremy Wiedner

@JeremyWiedner

Curiosity, creativity, and action are key!

Katılım Mayıs 2013
158 Takip Edilen59 Takipçiler
Jeremy Wiedner retweetledi
OSINT Industries
OSINT Industries@OSINTindustries·
Learn how to investigate Iranian cyber actors 🇮🇷 From IRGC-linked networks and proxy companies to real OSINT pivots, attribution, and ethical tradecraft. Watch the full webinar: us06web.zoom.us/rec/share/X24E… Passcode: R*2GXqfu
OSINT Industries tweet media
OSINT Industries@OSINTindustries

Iran’s internet is at 4% of normal levels. ⚠️ Cyber ops don’t stop in a blackout. Learn how investigators expose networks linked to the Islamic Revolutionary Guard Corps using OSINT. Register for our live webinar 👇 osint.industries/webinar/unmask…

English
0
7
25
2.8K
Jeremy Wiedner retweetledi
Renzon
Renzon@r3nzsec·
One of the biggest pain points for macOS-based DFIR analysts: "I have a raw Master File Table ($MFT) or USN Journal ($J), but I need a Windows VM just to parse it." Not anymore. IRFlow Timeline now imports raw $MFT and $J files directly: a two-pass binary parser extracts 22 columns matching MFTECmd output format, with full path reconstruction via parent reference chain-walking (thanks to CyberCX UsnJrnl Rewind). New Feature: Resident Data Extraction When a threat actor drops a small script or config (<700 bytes), it’s stored inline within the MFT record. Even if the file is "deleted," the content often survives. IRFlow now recovers resident MFT data with a single click. In recent ransomware cases, this has surfaced: - Deleted batch scripts & PowerShell loaders - Hidden ransomware configs - Attacker "cleanup" artifacts #DFIR #CyberSecurity #DigitalForensics #IncidentResponse #Infosec #macOS
English
10
20
92
5.4K
Jeremy Wiedner retweetledi
Mike Takahashi
Mike Takahashi@TakSec·
Google Dork - Exposed Configs 🔍 site:example[.]com ext:log | ext:txt | ext:conf | ext:cnf | ext:ini | ext:env | ext:sh | ext:bak | ext:backup | ext:swp | ext:old | ext:~ | ext:git | ext:svn | ext:htpasswd | ext:htaccess | ext:json
Mike Takahashi tweet media
English
9
118
900
41.8K
Jeremy Wiedner retweetledi
r1ru
r1ru@ri5255·
I have released the first half of "Binary Exploitation 101", a beginner-friendly guide to binary exploitation. You can learn from classic buffer overflow to ret2dlresolve through CTF-like challenges. I am working on the second half now. Stay tuned🔥 r1ru.github.io/categories/bin…
r1ru tweet mediar1ru tweet media
English
13
305
1.4K
61.9K
Jeremy Wiedner retweetledi
YungBinary
YungBinary@YungBinary·
Dropping a new malware config parser for #Amadey! Update your CAPEv2 parsers: > sudo -u cape bash -c 'cd /opt/CAPEv2 && poetry add CAPE-parsers@latest && systemctl restart cape cape-web cape-processor' Check it out here: github.com/CAPESandbox/CA…
YungBinary tweet media
English
0
14
70
7.7K
Jeremy Wiedner retweetledi
unsafe_call
unsafe_call@unsafe_call·
The attacker accidentally left their entire malicious extension playbook for @cursor_ai sitting in the same folder their extension was downloaded from 🤡
unsafe_call tweet mediaunsafe_call tweet media
zak.eth@0xzak

I've been in crypto for over 10 years and I’ve Never been hacked. Perfect OpSec record. Yesterday, my wallet was drained by a malicious @cursor_ai extension for the first time. If it can happen to me, it can happen to you. Here’s a full breakdown. 🧵👇

English
30
149
1.5K
206K
Jeremy Wiedner retweetledi
Smukx.E
Smukx.E@5mukx·
Mega Malware Analysis Tutorial Featuring Donut github.com/PaloAltoNetwor… TL;DR The purpose of this blog post is to walk our readers, particularly those who are just stepping into the realm of malware analysis, through our process of analyzing a unique .NET PE malware that loads Remcos.
Smukx.E tweet mediaSmukx.E tweet media
English
1
94
497
24.8K
Jeremy Wiedner retweetledi
John Hammond
John Hammond@_JohnHammond·
For the life of me I can never remember the registry tweaks to avoid TPM checks when installing Win11 in a VM. I finally took note of the `reg add` commands to just copy and paste into the Shift+F10 terminal. reg add "HKLM\SYSTEM\Setup\LabConfig" /f reg add "HKLM\SYSTEM\Setup\LabConfig" /v BypassTPMCheck /t REG_DWORD /d 1 /f reg add "HKLM\SYSTEM\Setup\LabConfig" /v BypassSecureBootCheck /t REG_DWORD /d 1 /f reg add "HKLM\SYSTEM\Setup\LabConfig" /v BypassRAMCheck /t REG_DWORD /d 1 /f reg add "HKLM\SYSTEM\Setup\LabConfig" /v BypassCPUCheck /t REG_DWORD /d 1 /f reg add "HKLM\SYSTEM\Setup\LabConfig" /v BypassStorageCheck /t REG_DWORD /d 1 /f
John Hammond tweet media
English
55
240
2K
175.7K
Jeremy Wiedner
Jeremy Wiedner@JeremyWiedner·
The original C2Live has not been updated in 2 years. It pulled in Nightly updates github.com/montysecurity/…. However, after July 2, 2024 they became weekly updates.
English
0
0
2
80
Jeremy Wiedner retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
Really like what @yamatosecurity is doing with Suzaku - applying Sigma to cloud logs is something we absolutely need. The cloud is a fragmented mess, and tools like this help defenders bring visibility into dark corners. They’re using the Detection Rule License 1.1, which is great. Let’s hope the community joins in and contributes rules for other cloud platforms too. Suzaku rules: github.com/Yamato-Securit… Sigma cloud rules: github.com/SigmaHQ/sigma/… Let’s get all cloud services covered eventually.
田中ザック (Zach Mathis)@yamatosecurity

Thanks to tremendous dev work by Fukusuke Takahashi and DustInDark, we have our first alpha version release of Suzaku - "Hayabusa for cloud logs". Still lots to implement but the basic sigma detection is working for AWS CloudTrail logs so try it out and give us feedback on how we can improve it for those of you who do DFIR in the cloud. Enjoy! github.com/Yamato-Securit… 高橋福助さんとDustInDarkさんによる素晴らしい開発のおかげで、Suzaku(Hayabusaをクラウドログ用にしたもの)の最初のアルファ版をリリースすることができました! まだ実装したい機能はたくさんありますが、AWS CloudTrailログに対する基本的なSigma検出は動作しています! クラウドでDFIRを行っている皆さん、ぜひ使ってみて、改善点やご意見をフィードバックしてください。 エンジョイ〜

English
4
21
98
12K
Jeremy Wiedner retweetledi
3xp0rt
3xp0rt@3xp0rtblog·
Leaked BlackBasta chat logs contain messages spanning from September 18, 2023, to September 28, 2024. Let's analyze the statements disclosed by the leaker: - Lapa is one of the key administrators of BlackBasta and is constantly busy with administrative tasks. Holding this high-trust position, Lapa is frequently insulted by his boss, who persistently demands major changes. The role causes Lapa significant stress, yet he earns significantly less compensation compared to others in the group. It appears that ransom payments might be an additional source of income for him to support his family during these difficult times. Under his administration, there was a brute force attack on the infrastructure of some Russian banks. So far, no actions seem to have been taken by law enforcement, suggesting that this situation could pose a serious problem and potentially provoke reactions from these authorities. - "Cortes" is associated with the Qakbot group, which had dealings with Americans last year, likely attracting the attention of intelligence services. When BlackBasta conducted these attacks on Russian banks, "Cortes" distanced himself from these actions, probably surprised that this Russian group would target its own country. This might be why Qakbot didn't participate in the attacks against Russia. - "YY" is also a main administrator of BlackBasta, seemingly very busy with support tasks and receives a good salary. The arrest of BlackBasta’s leader creates significant risks for the remaining members of the group. It turns out that the personal financial interests of Oleg, the group's boss, dictate the operations, disregarding the team's interests. Under his administration, there was also a brute force attack on the infrastructure of some Russian banks It seems that no measures have been taken by law enforcement, which could present a serious problem and provoke reactions from these authorities. - When "Trump" and "Bio" worked together in Conti, disputes over fees issues were common. Bio is paid more in his current position to continue managing such high-level risks. Bio changed his nickname from "bio" to "pumba" while working at Conti, but has now reverted to his old nickname in BlackBasta, so his reputation in BlackBasta should not be associated with the nickname "pumba". The recent arrest of "Bio" and the police's treatment likely caused concern among the BlackBasta group members. - Bio identifies "GG" as "Trump". It can be inferred that "GG", "AA", and "Trump" are all aliases used by Oleg Nefedov, the group's boss.
3xp0rt tweet media3xp0rt tweet media
PRODAFT@PRODAFT

BlackBasta’s internal chats just got exposed, proving once again that cybercriminals are their own worst enemies. Keep burning our intelligence sources, we don’t mind. 😉

English
5
85
252
75.5K
Jeremy Wiedner retweetledi
Chris Duggan
Chris Duggan@TLP_R3D·
Thread 1 / If you're gonna read one #CTI thread today, make it this one!! – How one IP unraveled an Access Broker's Ransomware Network! 🚨🧵 🚨 Unmasking Adversary Infrastructure – New Findings on 193.29.13.167! #ThreatIntel #Rustdoor #GateDoor 📌 My previous tweet spotlighted IP 193.29.13.167, tied to an Access Broker linked to #Rustdoor, sparking a cascade of findings across domains like datasmetric[.]com and historic indicators from maconlineoffice[.]com. Here’s how that single thread pulled open the ransomware landscape….....
Chris Duggan tweet media
English
3
44
253
26.8K
Jeremy Wiedner retweetledi
Who said what?
Who said what?@g0njxa·
#WhiteSnake Stealer has recently announced an update featuring the creation of malicious .SLN (Visual Studio Solution files) as downloaders from a remote host in order to serve malware Full changelog statement below: 👇👇
English
1
24
59
7.1K