Michael Grafl

10.6K posts

Michael Grafl banner
Michael Grafl

Michael Grafl

@MyKey_

Software Engineer, working at @skidata | Studied at @alpenadriauni | Tweets are my own (unless blatantly plagiarized)

Austria Katılım Temmuz 2009
575 Takip Edilen237 Takipçiler
Michael Grafl retweetledi
Fabian Pimminger
Fabian Pimminger@i_am_fabs·
Sie haben auch erstmals ein AI-generated Video aus den vorher nachher Bildern online gestellt, was das Ausmaß finde ich nochmal deutlicher macht. Die Gletscher Österreichs sind in der Endphase.
Deutsch
4
26
74
3.2K
Michael Grafl retweetledi
Georgy Kucherin
Georgy Kucherin@kucher1n·
It turned out there are many more payloads used in the Notepad++ attack! To stay undetected, its masterminds were COMPLETELY changing execution chains about every month. Here are more IPs used in the attack: 45.76.155[.]202 45.32.144[.]255 Read below for many other IoCs! [1/8]
Georgy Kucherin tweet media
English
19
236
1.2K
106K
Michael Grafl retweetledi
vx-underground
vx-underground@vxunderground·
Non-malware schizos asking about why the Notepad++ malware payload was so interesting. Okay, we'll discuss it without getting too schizo. First, Rapid7 (and other various Cyber Threat Intelligence vendors) seem to generally attribute the Notepad++ compromise to Chinese APT group "Lotus Bloom". They attribute it to Lotus Blossom because they tend to recycle code segments to save time. Basically, fingerprints. Lotus Blossom is the invented name intelligence organizations have assigned to a group of Chinese government sponsored hackers. Their true identity is unknown, but speculative. It is not one person, it is likely a group of unknown size, it could two people, it could 15 people. Lotus Blossom has been active since 2009 (or so they speculate). Lotus Blossom are not noobs who do hacker noob stuff. Lotus Blossom is assigned high-profile tasks. Lotus Blossom does extremely specific targets, most notably they are instructed by the Chinese government to hack government institutions, telecom companies, aviation companies, and critical infrastructure (nuclear power plants, electrical power grids, hydroelectric dams, etc) in Southeast Asia and Central America. When Lotus Blossom targeted Notepad++, and users in specific regions (presumably Southeast Asia and Central America) attempted to do an update it delivered "Chrysalis Backdoor". Chrysalis Backdoor is the name intelligence companies invented and now call this malware. Chrysalis Backdoor used a lot of really common malware techniques which truthfully I won't go too much into (API hashing, custom implementations of GetProcAddress, malware nerd stuff). However, what makes this malware very special is it's usage of Microsoft Warbird. Microsoft Warbird is a proprietary technology which is rarely discussed. It is an internal library Microsoft uses to obfuscate it's instruction set in-memory. In other words, it's Microsoft really fancy custom way of preventing people from reverse engineering what Windows is doing when it's running. Unknown to me personally (and a lot of people apparently), in the past few years (2023) some security researchers have discovered ways to discretely use Microsoft Warbird and use it as a weapon. Basically, you can use undocumented APIs in Windows to use Warbird for your malware. This provides a way to hide what your malicious code is doing while it's running without needing any external tooling or custom implementations. They're weaponizing Microsoft's anti-tampering and/or anti-reverse engineering technology for malicious purposes. This is extremely impressive because it shows: 1. Lotus Blossom pays close attention to really talented security researchers or... 2. Lotus Blossom has really good security researchers on payroll Both are totally possible. The remainder of the Lotus Blossom tooling is fairly generic malware stuff and isn't too terribly impressive. Lotus Blossom (unironically) did a very good job hijacking Notepad++ update infrastructure and weaponizing Microsoft's anti-tampering technology (Warbird).
English
32
187
1.8K
94.7K
Michael Grafl
Michael Grafl@MyKey_·
Ambitioniert, liebe Post, ambitioniert.
Michael Grafl tweet media
Deutsch
0
0
0
6
Michael Grafl
Michael Grafl@MyKey_·
Nicht der Bohne aussetzen?
Michael Grafl tweet media
Deutsch
0
0
0
4
Fabian Pimminger
Fabian Pimminger@i_am_fabs·
Das ist die schlechteste Krisenkommunikation die ich je gesehen habe. 💀😭😭😭😭
Fabian Pimminger tweet mediaFabian Pimminger tweet media
Deutsch
3
0
44
3.3K
Vlad Mihalcea
Vlad Mihalcea@vlad_mihalcea·
What version of Spring Boot are you using?
English
2
1
3
11.7K
SwiftOnSecurity
SwiftOnSecurity@SwiftOnSecurity·
"It is seen as increasingly possible Eminem at no point had a fan named Stan, who put his pregnant girlfriend in the trunk and drove off a bridge with a tape that didn't say who it was to."
SwiftOnSecurity tweet media
English
6
11
197
22.1K
Michael Grafl retweetledi
Sam Brannen
Sam Brannen@sam_brannen·
#JUnit 6.0.0 is released! ✨ Java 17 and Kotlin 2.2 baseline 🌄 JSpecify nullability annotations 🛫 Integrated JFR support 🚟 Kotlin suspend function support 🛑 Support for cancelling test execution 🧹 Removal of deprecated APIs docs.junit.org/6.0.0/release-…
English
2
78
223
21.2K
Michael Grafl
Michael Grafl@MyKey_·
Using URLs from the browser history for AI prompt injection is creative, I have to admit. 😬🫠
Tenable@TenableSecurity

New #TenableResearch discovery 🚨: The "Gemini Trifecta" exposed three critical, now-remediated vulnerabilities in Google's #GeminiAI, highlighting how new attack classes target sensitive user data. Read the full research here: spr.ly/6014A9Z8y

English
0
0
0
14