Tony Shannon

4K posts

Tony Shannon banner
Tony Shannon

Tony Shannon

@ShannonTony

Computing, Security, Lock-picking & Hackspaces. Tea fiend. He/Him https://t.co/jdyDxqdXF5

Nottingham, England Katılım Mart 2010
914 Takip Edilen218 Takipçiler
Sabitlenmiş Tweet
Tony Shannon
Tony Shannon@ShannonTony·
Folks, made the jump a while back, lurked to watch the decline, which increases in pace. So long and thanks for all the fish.
Tony Shannon tweet media
English
1
0
2
1.3K
Tony Shannon
Tony Shannon@ShannonTony·
@CrossCountryUK my daughter is booked on the 08:20 Aberdeen ton Plymouth direct, which is shown as cancelled due to a shortage of drivers. I need to advise her on what trains to travel on - can you advise?
English
0
0
0
58
Tony Shannon retweetledi
John Carreyrou
John Carreyrou@JohnCarreyrou·
The mystery of Satoshi Nakamoto, the pseudonymous inventor of Bitcoin, has remained unsolved for 17 years. Not anymore. Read my 18-month investigation to find out who Satoshi really is. nytimes.com/2026/04/08/bus…
English
938
1.4K
8.9K
5.2M
Tony Shannon retweetledi
Hend Amry
Hend Amry@LibyaLiberty·
Jewish troops will be looking for Muslims hidden in the attics of Christians. Let that sink in.
English
1.1K
47.2K
157.4K
5.2M
Tony Shannon retweetledi
Paul Moore - Security Consultant 
I've been telling everyone, for years, to uninstall #police #cyberalarm If you're still running it in 2026 (the Pervade version), don't take my advice... read this, mindful that the UK gov't has just partnered with Anthropic and deployed Claude AI for public services - so I assume they trust its judgement. This is what #securityResearchers have to put up with.
Paul Moore - Security Consultant  tweet mediaPaul Moore - Security Consultant  tweet media
English
0
7
25
2.9K
Tony Shannon retweetledi
vx-underground
vx-underground@vxunderground·
The LiteLLM supply chain attack is big shenanigans. I have to explain the whole thingie though so you can get the full context of the shenanigans. TeamPCP (the people who probably did it) is unironically swinging a big ass fuck off baseball bat, they're swinging for the moon. tl;dr see picture of cat as summary I also want to preface this with I DID NOT PERFORM THIS ANALYSIS. I almost never do open-source solutions malware stuff and this is also more in the line of work with DFIR (Digital Forensics and Incident Response). This summary comes from various peers and colleagues of mine who have been discussing TeamPCP the past couple of days. DFIR nerds I sourced: - @ramimacisabird - @InsiderPhD Non DFIR nerds I sourced: - @IceSolst - @IntCyberDigest Yeah, so pretty much this group of nerds named TeamPCP bamboozled an open-source security product called Trivy. TeamPCP sent a pull request on GitHub but did it with "pull_request_target". Normally a pull request isn't a big deal. Nerds do it all the time. "pull_request_target" though is designed to copy secrets, tokens, etc. pull_request_target is a legit thing. People do it all the time. It should only be performed by people you trust. TeamPCP impersonated a legitimate GitHub contributor. Trivy was caught slippin'. When TeamPCP did pull_request_target they stole access tokens to a place called Aqua Security. Aqua Security was like, "lol gosh dang it" and did what you were supposed to do. They rotated access tokens and passwords and stuff. However, Aqua made an oopsie and forgot to rotate the stuff for one of their automation bots. Once TeamPCP had access they injected malicious code which steal environment variables, SSH keys, cloud credentials, cryptotokens, etc into three things. - Trivy - Trivy GitHub actions - Trivy Docker stuff As is tradition, once TeamPCP put malware into Trivy stuff, anyone who did anything with Trivy was given malware. TeamPCP got a metric poop ton of stolen data and began using it to move to NPM projects. The projects they infected next was infected with a malware people named "CanisterWorm". In extreme summary, CanisterWorm placed stuff in package.json from the infected NPM project. Every new infected NPM project would download malware to the machine that (unsurprisingly) stole your data. TeamPCP seems to have been inspired by the North Korean government, or ALPHV ransomware group, because instead of stealing data to their server they store it on the blockchain ... making it virtually impossible to takedown. LiteLLM takes place somewhere between Trivy and CanisterWorm. As of this writing the exact way TeamPCP got access to LiteLLM is unknown, however it's heavily speculated it is from Trivy. TeamPCP also stated very bluntly they got access from Trivy but ... they could also be lying. This may come as a surprise, but sometimes criminals lie to cover their tracks. LiteLLM infection though was a few more degrees amplified than the previous stuff. LiteLLM infection also attempts lateral movement by automating Kubernetes stuff. LiteLLM infection also steals a ton more data than previous stuff. Here is the big ass list of stuff it steals: - SSH keys - AWS credentials and configurations - GCP credentials and configurations - Azure environment variables - Kubernetes credentials and configurations - Environment configurations - Shell History - Git credentials and configurations - Docker credentials and configurations - Database instances - IaC / CI/DI - SSL private keys - Solana keys - Crypto wallets - VPN credentials and configurations - Hashicorp vault (?) - NPM configurations - SMTP credentials TeamPCP is unironically putting in big moves. What makes them unusual is how profoundly aggressive they are. It isn't uncommon for Threat Actors to attempt things like this, but TeamPCP is doing something more akin to "smash and grab" rather than "stay silent and watch".
vx-underground tweet media
English
33
163
1.2K
60K
Tony Shannon retweetledi
Reclaim The Net
Reclaim The Net@ReclaimTheNetHQ·
Spain just fined the age verification company governments are forcing you to use €950,000 for GDPR violations. Biometric data retained too long, geolocation data kept for five years, fraud documents repurposed to train their AI. The infrastructure being built to "protect children" is already failing basic legal privacy requirements...
Reclaim The Net@ReclaimTheNetHQ

Spain Fines ID Tool Yoti for Privacy Violations in Biometric ID App reclaimthenet.org/yoti-gdpr-fine…

English
27
602
2.3K
48.3K
Tony Shannon retweetledi
Ashley M. Gjøvik
Ashley M. Gjøvik@ashleygjovik·
🧵 When I started calling out Apple in 2021, tons of ex-coworkers contacted me saying some version of: Apple was a huge d*ck, they sued Apple, the litigation was the worst thing in their entire life & they can't even talk about it. What I'm observing first hand, & can tell you...
English
4
79
603
92.5K
Tony Shannon retweetledi
Matthew Green
Matthew Green@matthew_d_green·
Meta appears to be reversing its strong stance on encryption. The first obvious casualty is that they’re abandoning and disabling end-to-end encryption in Instagram DMs.
English
44
285
1.3K
260.3K
Tony Shannon retweetledi
Mahmoud Al-Qudsi
Mahmoud Al-Qudsi@mqudsi·
A write-up on what was tried these past 48 hours (and what finally worked). Link in reply.
Mahmoud Al-Qudsi tweet media
English
152
1.8K
16.9K
1.2M
Tony Shannon
Tony Shannon@ShannonTony·
@HelpAliExpress Thanks replied via DM - not an issue with someone sending me messages and me receiving notifications, I am receiving notifications for messages that do not exist. Have sent screenshots, and email header - please escalate to your IT team - not an account notification setting
English
1
0
0
16
AliExpress Customer Service
AliExpress Customer Service@HelpAliExpress·
@ShannonTony We apologize for any inconvenience this may cause. we have received your feedback and already contacted you via DM. Thanks for reaching out.
English
1
0
0
14
Tony Shannon
Tony Shannon@ShannonTony·
@HelpAliExpress am getting 20-30 broken email notifications from your site every day. Have tried to report via website, your help function, and via DM with no success. How can I report this to you to fix?
English
1
0
0
32
Tony Shannon
Tony Shannon@ShannonTony·
@Specsavers - after nearly 2 years of return-to-sender mail you are incorrectly addressing to the previous occupants, have to ask if your returns department need to go to @VisionExpress If I DM you a photo of the misaddressed mail, can you sort this?
English
1
0
0
38
Tony Shannon retweetledi
vx-underground
vx-underground@vxunderground·
.@Newsweek published an article today about a Threat Group trying to extort Google. The extortion group is demanding Google terminate some of their Threat Intelligence researchers. Obviously Google won't do this, but this is a calculated decision by the Threat Group to apply social and/or political pressure on the Threat Intelligence researchers. Newsweek, for reasons I cannot possibly fathom, decided to name drop the individual persons the Threat Group is demanding be terminated. These are not celebrities, these are not famous people, these are not politicians or socialites. They listed, in no exaggeration, regular Threat Intelligence employees. I've NEVER seen ANY media outlet do that, EVER. ... Is Newsweek actively aiding and abetting Cyber Terrorists? Are they receiving kickbacks? Why would anyone, in their right mind, decide to air out to (potentially) millions of people, regular people who are being subjected to an intimidation campaign?
English
33
79
884
54.8K
Tony Shannon
Tony Shannon@ShannonTony·
@UK_Daniel_Card The Conversation - one of Gene Hackmans finest, can be paired with Enemy of the State, which is… one of Gene Hackmans films.
English
0
0
2
50
mRr3b00t
mRr3b00t@UK_Daniel_Card·
Sitting in the living room with a cup of tea watching DIE HARD 4..... I need another hacking film to watch next... can't be HACKERS/SNEAKERS/MATRIX etc. I need something different...
English
151
6
237
42.4K
Tony Shannon retweetledi
NITZER EBB
NITZER EBB@nitzerebb·
It is with a heavy heart that we regret to inform that Douglas McCarthy passed away this morning of June 11th, 2025. We ask everyone to please be respectful of Douglas, his wife, and family in this difficult time. We appreciate your understanding and will share more information soon.
NITZER EBB tweet media
English
185
589
1.8K
168K