Alex. Turing

299 posts

Alex. Turing

Alex. Turing

@TuringAlex

Kernel Developer | Security REsearcher | Basketball Fan {Botconf | VirusBulletin | Kaspersky SAS} Speaker Current: @Xlab_qax EX: @360Netlab @Kaspersky AKA 渣兔

Katılım Aralık 2014
375 Takip Edilen1.4K Takipçiler
Ayaan 🐧
Ayaan 🐧@twtayaan·
i finally understand why it’s called linux porn 😭
English
103
718
8.6K
769.9K
Alex. Turing
Alex. Turing@TuringAlex·
#botnet #ioc #c2 👉 xlabslover[.]lol and the console output had us in stitches. 😂 📸"To love or hate, that is the question". 📸 By the way, @Huntio about "The xlab 2 Rivalry" part… hmm, I'm thinking "F-word xlab 2" — may be "F-word xlab too."🤣 Happy hunting 🍷@Xlab_qax
Alex. Turing tweet media
Hunt.io@Huntio

🚨 NEW RESEARCH: xlabs_v1 DDoS-for-Hire IoT Botnet Exposed - One Open Directory. An Entire Operation Revealed. hunt.io/blog/xlabs-v1-… The operator built a full commercial DDoS-for-hire operation. Tiered pricing, 21 flood variants, competitor-killing routines baked in. Then left the whole toolkit on a public server with no login. Hunt.io AttackCapture tool had it indexed before they noticed. Key findings: - Botnet branded xlabs_v1, operator handle Tadashi, targeting game servers and Minecraft hosts - 21 flood variants including RakNet and OpenVPN-shaped UDP to dodge common filters - TCP/5555 observed open on 4M+ hosts in the past 180 days, any running ADB is a potential target - ChaCha20 encryption broken via known-plaintext, full nonce reuse across all 16 calls - C2, staging, distribution, and Monero cryptojacking all inside one bulletproof /24 in the Netherlands 👉 Full IOCs, MITRE mapping, and HuntSQL queries: hunt.io/blog/xlabs-v1-…

English
0
7
20
3K
Alex. Turing
Alex. Turing@TuringAlex·
🚨#fast16 🫡向大佬们脱帽致敬,这溯源能力太强了! Lua brings me back to the days of analyzing Project Sauron and Godlua. For the lazy ones out there, I’ve uploaded the decrypted and preliminarily decompiled Lua payloads to VT 18735eebaa648c22d68a3a362d89dc6a. Happy hunting
Alex. Turing tweet mediaAlex. Turing tweet media
English
1
15
66
8K
Alex. Turing
Alex. Turing@TuringAlex·
最近最有意思的故事 #fast16 🫡,真想当面八卦一下他们研究背后的故事😂,感觉大家还是低估了shadowbroker泄漏出来的东西,再研究研究,说不定还有新的发现或新的线索🧐🤔
Tom Hegel@TomHegel

Fresh research from the team (@vkamluk / @juanandres_gs) - this one goes back quite awhile! fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet sentinelone.com/labs/fast16-my…

中文
1
1
16
2.3K
Alex. Turing
Alex. Turing@TuringAlex·
@juanandres_gs @frdfzi @vkamluk Orz,太太太强了🫡!Is there gonna be a recording of your talk? I can’t wait to hear all the juicy tea behind it.🧐🧐
English
0
0
0
101
J. A. Guerrero-Saade
J. A. Guerrero-Saade@juanandres_gs·
Master @vkamluk is on stage at #BlackhatAsia solving a legendary mystery of CTI— fast16, a unique cyber sabotage operation from 2005, preceding Stuxnet by ~2-3 years.
J. A. Guerrero-Saade tweet media
English
4
22
79
6.7K
ZachXBT
ZachXBT@zachxbt·
@OldEBT No they still cannot build a missile that has accurately hit neighboring enemy countries
English
8
1
84
5.6K
ZachXBT
ZachXBT@zachxbt·
1/ Recently an unnamed source shared data exfiltrated from an internal North Korean payment server containing 390 accounts, chat logs, crypto transactions. I spent long hours going through all of it, none of which has ever been publicly released. It revealed an intricate ~$1M/month scheme of fraudulent identities, forged legal documents, and crypto-to-fiat conversion. Enjoy the findings!
ZachXBT tweet media
English
337
886
6.1K
1.1M
Alex. Turing
Alex. Turing@TuringAlex·
@av_eip @Xlab_qax 🤔The Winnti ELF backdoor is ~80-200KB in size. If it had been packed with something like UPX, the size should be reduced, not bloated to 2MB as it is now. APT41 commonly packages their malware with VMProtect, you can take a look at KEYPLUG 900ca3ee85dfc109baeed4888ccb5d39😄
English
0
0
0
149
av_eip
av_eip@av_eip·
@TuringAlex @Xlab_qax Don't think it is VMProtect. Seems like the binary uses a modified UPX packer with custom ELF section names .eDM0 and .eDM1 in place of the standard UPX0/UPX1 sections.
English
1
0
0
159
Alex. Turing
Alex. Turing@TuringAlex·
🚨#APT41 Just spotted a fresh #Winnti #ELF backdoor f1403192ad7a762c235d670e13b703c3— 0 detections on VT and packed with VMProtect. 📸One of the #C2 "ai.qianxing[.]co" is clearly impersonating our company’s domain. They’re getting bold.🤣#IOC Happy hunting 🍷@Xlab_qax
Alex. Turing tweet mediaAlex. Turing tweet mediaAlex. Turing tweet media
English
3
37
132
19.9K
Costin Raiu
Costin Raiu@craiu·
A 2.5hr opus, for your weekend earholes. We remember GReAT teammate Sergey Mineev, the legendary malware hunter behind discoveries like Equation Group and Project Sauron (Remsec), including stories about his methods and why he was the best to ever do it. Plus, another in-the-wild iOS exploit kit discovery and a long overdue conversation about Apple's responsibility to hundreds of millions of users on older iOS versions... securityconversations.com/episode/the-gr…
English
5
12
77
9K
Alex. Turing
Alex. Turing@TuringAlex·
🚨The iOS exploit kit #Coruna is a fascinating case. With XLAB #PDNS, its DGA C2s are easily exposed—we grabbed four ourselves. Stats show ~4,400+ infected IPs (or researchers) per day. Surprisingly, 98.5% of these IPs are located in China, why?🤔 Happy hunting 🍷@Xlab_qax
Alex. Turing tweet mediaAlex. Turing tweet mediaAlex. Turing tweet media
English
1
4
13
2.3K
Alex. Turing
Alex. Turing@TuringAlex·
做了一些微小的工作,make the world a better place🫡 Happy hunting 🍷@Xlab_qax
Alex. Turing tweet media
日本語
1
0
8
810
Ben
Ben@deobfuscately·
Not just bigpanzi 😄 other tv boxes also observed removing it [ "com.n2.systemservice06", "com.n2.systemservice061", "com.n2.systemservice062", "com.n2.systemservice063", "com.n2.systemservice0644", "com.android.systemservice0644", "com.a.androidsvc", "com.k.sdk", "com.abcproxy.proxysdk", "com.abcproxy.lolsdk" ]
English
1
0
3
367
Alex. Turing
Alex. Turing@TuringAlex·
🚨#Botnet In February, an invisible war broke out within #Android TV Boxes between #Bigpanzi and #Kimwolf. Bigpanzi issued the "pm uninstall" command to remove Kimwolf's APK,哈哈,果然同行是冤家😂 Happy hunting 🍷@Xlab_qax
Alex. Turing tweet media
English
1
8
42
5.5K
Alex. Turing
Alex. Turing@TuringAlex·
@birising @Xlab_qax Maybe ctf or even PLC coding practice 🤔. I’m pretty clueless when it comes to PLCs🥹🥹
English
0
0
1
191
Alex. Turing
Alex. Turing@TuringAlex·
🚨An interesting #ELF sample da2e396baf23de1881d06dd3377f84a6 on VT, packed by modified upx, appears to be a #PLC program for traffic light control, but why does it contain an embedded XOR code to establish a reverse shell to 173.180.247[.]200🤔? #IOC Happy hunting 🍷@Xlab_qax
Alex. Turing tweet mediaAlex. Turing tweet media
English
2
20
95
7K