
Andrew Thompson
5.4K posts

Andrew Thompson
@ImposeCost
Head of Global Signals Operations @Google Threat Intelligence Group via @Mandiant acquisition. Posts are attributable to me—not my employer. Former @USMC.






I was living in the world of "DPRK attribution is a mess" completely unaware, up to the last week, there's a "Russian traffer MacOS malware attribution is a mess" world too! It's such a different type of a mess, lovely. My high level observation right now is that what makes it so messy is extreme similarity on TTP (Social engineering, fake landing pages design, same affiliates deploying multiple types of campaigns using different MaaS) while extreme dissimilarity of binaries delivered (These chronically get 'wrong' signature names on VT too). With DPRK it is often enough to observe social engineering component (and its target) to quickly get a vibe of what specific boy(s) are responsible. That's like completely useless for RU-traffer stuff. Or, dunno, maybe I am already half-North Korean and we sync'd our cycles or something.


Under the hood, we actually just run cyberchef.js within a JavaScript engine and bridge it to IDAPython. It’s a little gross, but it works well. As we developed test cases for all the operations, we found and reported 10 upstream bugs.









#SCOOP: Sources share surveillance photo of suspect, 20-year-old Daniel Moreno-Gama. He’s accused of traveling from Spring, Texas to San Francisco to try and kill the OpenAi CEO and throw a Molotov cocktail at his house. Fox was here as FBI agents raided his home and my sources tell me he was found with an anti-Ai manifesto when he was arrested in San Francisco. The document had a list of other Ai executives with their names and addresses.



Healthy reminder that "trusted tools" is a whole concept in digital forensics and incident response. Willi's a real pro. I remember discovering CyberChef couldn't handle big numbers. 🤪 Validate your tool's output!






