Brian Baskin

16.2K posts

Brian Baskin banner
Brian Baskin

Brian Baskin

@bbaskin

Threat researcher, malware analysis, RE, incident response, with some old school forensics and CTFing. Apologetic ginger. These are my personal opinions

Bawlmer, Maruhlan, US Katılım Kasım 2008
884 Takip Edilen7.3K Takipçiler
Brian Baskin
Brian Baskin@bbaskin·
TIL, if you forget $60 cash back at a Walmart self checkout, it will just patiently keep it there for anyone to take. It won't retract it. Kudos to the two people after me at that station who ignored it, but not to the third that took it.
English
0
0
0
39
Brian Baskin
Brian Baskin@bbaskin·
I don't know how anything works anymore
Brian Baskin tweet media
English
0
0
0
112
Drew
Drew@bugfireIO·
@sublime_sec Great report! Are any of these KrakVM html samples available?
English
1
0
1
32
Brian Baskin retweetledi
Sublime Security
Sublime Security@sublime_sec·
🚨 Threat actors are now using JavaScript virtual machines to hide phishing payloads inside HTML attachments. Sublime Threat Intelligence and Research (STIR) observed FlowerStorm operators adopting KrakVM just weeks after its release. The campaign included: • VM-based obfuscation • Credential harvesting • Real-time MFA interception A key takeaway: advanced obfuscation is becoming easier to operationalize. Our latest research breaks down the attack chain and what defenders should watch for next. sublime.security/blog/flowersto… #Cybersecurity #Phishing
Sublime Security tweet media
English
1
4
20
4.9K
Brian Baskin
Brian Baskin@bbaskin·
This type of decoding is always fun to me. I gave a presentation 14 years ago (OMG!) at @novahackers on deobfuscating and reading encoded Java opcodes: #1" target="_blank" rel="nofollow noopener">slideshare.net/slideshow/java…
English
0
0
0
131
Brian Baskin
Brian Baskin@bbaskin·
It wasn't until I started searching variables for code reuse on Github did I realize it was a brand new open source project released just a few weeks prior: github.com/krakes-dev/Kra… Lesson to learn: New open source tools will be found and immediately put into use by threat actors
English
1
0
2
142
Brian Baskin
Brian Baskin@bbaskin·
Years ago I transferred all my passwords from LastPass to 1Password Apparently along the way Excel got involved
Brian Baskin tweet media
English
1
0
10
1.6K
Brian Baskin retweetledi
kshitij vaze
kshitij vaze@VazeKshitij·
The rot has spread so deep, the very foundations have now started falling.
kshitij vaze tweet media
Pune, India 🇮🇳 English
353
3.3K
43.9K
1.2M
Brian Baskin retweetledi
Kostas
Kostas@Kostastsale·
𝗦𝗺𝗮𝗹𝗹 𝗺𝗮𝗰𝗢𝗦 𝗶𝗻𝘃𝗲𝘀𝘁𝗶𝗴𝗮𝘁𝗶𝗼𝗻 𝗹𝗲𝘀𝘀𝗼𝗻 𝗳𝗿𝗼𝗺 𝗮 𝗳𝗮𝗸𝗲 𝗛𝗼𝗺𝗲𝗯𝗿𝗲𝘄 𝗶𝗻𝘀𝘁𝗮𝗹𝗹𝗲𝗿 𝗶𝗻𝘃𝗲𝘀𝘁𝗶𝗴𝗮𝘁𝗶𝗼𝗻: The pasted command used echo to hold a Base64 payload, then decoded and executed it through zsh. 𝗣𝗮𝘁𝘁𝗲𝗿𝗻: 𝚎𝚌𝚑𝚘 '<𝚋𝚊𝚜𝚎𝟼𝟺>' | 𝚋𝚊𝚜𝚎𝟼𝟺 -𝙳 | 𝚣𝚜𝚑 At first glance, this seems easy to hunt. But the payload lives in the echo portion. If your EDR or system-derived telemetry does not preserve that command text, you may only see the later stages: Base64 decoding and shell execution. "𝚎𝚌𝚑𝚘" will not appear as its own process because it is handled as a shell builtin. That makes the day and night difference during IR! What you will see instead is: • event1: 𝚋𝚊𝚜𝚎𝟼𝟺 -𝙳 • event2: 𝚣𝚜𝚑 𝗗𝗲𝘁𝗲𝗰𝘁𝗶𝗼𝗻/𝗵𝘂𝗻𝘁𝗶𝗻𝗴 𝘁𝗮𝗸𝗲𝗮𝘄𝗮𝘆: Look for standalone base64 -d execution with no other command-line arguments, followed by shell execution in zsh, bash, or sh, and subsequent network activity.
Kostas tweet media
English
1
15
69
27.8K
Brian Baskin retweetledi
Dinohacks
Dinohacks@nhegde610·
@herrcore @X @nikitabier Thank you. Even after the appeal, they are claiming that it violated the rule so I had to delete the post to get my account back.
English
0
2
4
1.8K
Brian Baskin retweetledi
Katie
Katie@ALadyNamedKatie·
When I die, please cover my casket in my sticker collection that I bought but could never commit to applying on things
English
408
30.1K
180.1K
3.5M
Brian Baskin
Brian Baskin@bbaskin·
A rare outing to see Bring me the Horizon (@bmthofficial) and Motionless in While (@MIWband) live last night with my youngest. Two of my fav bands. Tempted to drive up to Philly just to see Ankor (@ankormusic) but that's a bit too much for one week
Brian Baskin tweet mediaBrian Baskin tweet media
English
0
0
1
233
Brian Baskin retweetledi
nixCraft 🐧
nixCraft 🐧@nixcraft·
Google Chrome silently installs a 4 GB AI model on your device. > No consent dialog. No opt-out UI. Re-installs itself if the user removes it manually. That is the true definition of malware.
nixCraft 🐧 tweet media
English
520
6.6K
25.4K
1.2M
Brian Baskin retweetledi
Tom Jøran Sønstebyseter Rønning
Tom Jøran Sønstebyseter Rønning@L1v1ng0ffTh3L4N·
Microsoft Edge loads all your saved passwords into memory in cleartext — even when you’re not using them.
English
250
1.4K
8.9K
1.5M
Brian Baskin retweetledi
Matthew Green
Matthew Green@matthew_d_green·
This also sums up how I feel about Passkeys.
Matthew Green tweet mediaMatthew Green tweet media
English
12
19
358
50.5K
Brian Baskin
Brian Baskin@bbaskin·
The State of AI Me: How do I do X? ChatGPT: You want to do X? This is why X is good This is what you should look for This is what you shouldn't do These are current trends and why it's sometimes done ... here's how to do X BUT here's how to do X better! Here's an essay summary
English
0
0
0
228
Brian Baskin retweetledi
Huntress
Huntress@HuntressLabs·
On April 16, 2026, a threat actor used stolen VPN creds to pivot into a Huntress partner Windows workstation and dropped a SYSTEM-level backdoor using the Komari agent - a 4.3k-star, MIT-licensed, Go-based project on GitHub. 👇🧵
English
6
36
224
42.2K