Sam Hanson

398 posts

Sam Hanson banner
Sam Hanson

Sam Hanson

@__samhanson__

Malware hunting/analysis and vulnerability research at Dragos.

Katılım Temmuz 2019
707 Takip Edilen252 Takipçiler
Sabitlenmiş Tweet
Sam Hanson
Sam Hanson@__samhanson__·
It’s been a busy last few weeks! Check out our analysis on PIPEDREAM - the 7th malware family to target industrial control systems. It was a fun (at times crazy) project to work on! dragos.com/blog/industry-…
English
1
5
18
0
Sam Hanson
Sam Hanson@__samhanson__·
@SANSICS Come hang on Thursday at 1pm! I’ll be talking about (and slightly making fun of) opportunistic hacktivists
English
0
0
0
25
Sam Hanson retweetledi
SANS ICS
SANS ICS@SANSICS·
📢 You can't afford to miss this webcast! Learn the methods cybercriminals use to exploit vulnerable systems with KurtLar_SCADA, complete with case studies and an in-dept malware analysis w/ @__samhanson__ . 🚨 RSVP: buff.ly/43bwcrh
SANS ICS tweet media
English
1
1
2
330
Sam Hanson retweetledi
SANS ICS
SANS ICS@SANSICS·
🌐 Join host @__samhanson__ as he dissects the tactics behind KurtLar_SCADA—a tool that scans for exposed VNC servers to exploit. Hear real-world cases, victim notifications, & the role of partnerships w/ OT-CERT & CISA. 👉 Register: buff.ly/43bwcrh
SANS ICS tweet media
English
0
1
2
201
Sam Hanson retweetledi
SANS ICS
SANS ICS@SANSICS·
🚨 KurtLar_SCADA is just 1 of many tools that exploit misconfigurations & weak practices. Learn: → How attackers exploit ICS vulnerabilities → The role of Telegram in cybercrime marketplaces → Tips to secure your infrastructure Register: buff.ly/43bwcrh
SANS ICS tweet media
English
0
2
2
1K
Sam Hanson retweetledi
clem
clem@n0debreak·
🔍Today @RecordedFuture published our report on a Russian influence operation we track as "Operation Undercut" and attribute to the Social Design Agency, the sanctioned Moscow company behind Doppelgänger. So far, like the SDA's other projects, the network's impact and audience is minimal.🧵(1/x) recordedfuture.com/research/opera…
English
2
7
13
1.8K
Sam Hanson retweetledi
Andy Greenberg (@agreenberg at the other places)
Russian spies—likely Russia's GRU intelligence agency—used a new trick to hack a victim in Washington, DC: They remotely infected another network in a building across the street, hijacked a laptop there, then breached the target organization via its Wifi. wired.com/story/russia-g…
English
24
983
1.7K
277.1K
Sam Hanson retweetledi
Steve YARA Synapse Miller
Steve YARA Synapse Miller@stvemillertime·
*downselection of activity not to scale
Steve YARA Synapse Miller tweet media
English
2
17
100
11K
Sam Hanson retweetledi
Ben Nimmo
Ben Nimmo@benimmo·
OUT TODAY: @OpenAI's update on disrupting deceptive uses of AI. Featuring case studies of cyber operations, covert influence ops and deceptive networks that we disrupted from around the world: openai.com/global-affairs…
English
1
50
102
17K
Sam Hanson retweetledi
Chris Krebs
Chris Krebs@C_C_Krebs·
On the hack of the Trump campaign, I’m taking this seriously & have it on good authority it’s the real deal. You should too. I tend to not comment much these days for various reasons personal & professional, but this is important, I have a bit of relevant insight & experience, & there’s more coming & we need to be prepared for down the road. You might not like the victim here, but the adversary gives zero Fs who you like or don’t like. They have their own objectives and guess what, you’re the target. Take this seriously. But also keep in mind that you’re part of the playbook, they want you to either amplify it or doubt it. Take a beat, touch grass as the kids say, & just vote. American voters decide American elections. Let’s keep it that way.
English
553
2.1K
7.6K
1M
Sam Hanson retweetledi
Andy Greenberg (@agreenberg at the other places)
In January, Russia-linked hackers used a new form of malware to sabotage monitoring equipment in a heating utility in Lviv, Ukraine, turning off heat and hot water to 600 buildings for close to 48 hours in the midst of freezing winter temperatures. wired.com/story/russia-u…
English
2
81
151
40.3K
Sam Hanson retweetledi
Dragos, Inc.
Dragos, Inc.@DragosInc·
Get an in-depth technical analysis and strategic overview on the Fuxnet ICS-specific malware from Dragos WorldView Threat Intelligence. Equip yourself with knowledge to safeguard your OT systems from adversaries. Download Now! hubs.la/Q02DKzC10 #DragosIntel #ICSsecurity
Dragos, Inc. tweet media
English
0
4
3
689
Sam Hanson retweetledi
Joe Słowik 🌻
Joe Słowik 🌻@jfslowik·
Repeatedly reminded that the greatest issue facing OT/ICS protocol security isn't confidentiality (demanding encryption) but INTEGRITY (demanding checksums and similar) given realities and impact scenarios... Yet we're going to continue to hear about encryption.
English
3
5
42
3.9K
Sam Hanson retweetledi
Brian in Pittsburgh
Brian in Pittsburgh@arekfurt·
The normalization of calling elections "rigged" just because your preferred candidate or yourself (as a candidate) didn't win is one of the most disturbing developments in American politics over the last 10-20 years. Regardless of what party or ideology you support.
English
7
27
176
18.3K
Sam Hanson retweetledi
Joe Słowik 🌻
Joe Słowik 🌻@jfslowik·
I see that SUPER SCARY NETFLOW DATA is in the news again For Ron Wyden's office:
Joe Słowik 🌻 tweet media
English
1
9
58
4.5K
Sam Hanson
Sam Hanson@__samhanson__·
@chompie1337 @qkaiser It’s my current project. It fckn sucks and I’m with you. I’ve made some progress over last couple weeks but wow. Going from Cython codebase to CPython codebase to actually looking at the sample is brutal.
English
0
0
4
165
chompie
chompie@chompie1337·
@qkaiser probably the most stuck I’ve ever felt tbh
English
1
0
1
1.7K
chompie
chompie@chompie1337·
anyone have any tips or tools to reverse CYTHON compiled binaries?
English
13
9
52
70.2K
Sam Hanson
Sam Hanson@__samhanson__·
@chompie1337 IDK if your binary is ELF or EXE, but if it’s an elf file and you want a high level understanding, I found this command to be very useful in understanding what strings/func names got preserved from the original py script: readelf -s sample | grep “ __pyx”
English
0
0
0
71
Sam Hanson
Sam Hanson@__samhanson__·
@chompie1337 My current project — been RE-ing a cython binary for a month now. Couple of things that might be useful. Are there any doc strings in the module? If so, run a python interpreter instance and import the module then run help(module_name) to access it. Also viewable in IDA
English
1
0
0
176