Kirill Firsov

244 posts

Kirill Firsov banner
Kirill Firsov

Kirill Firsov

@k_firsov

Co-founder and CTO of @FearsOff | Protecting the World’s Top Crypto Exchanges & Financial Institutions | Cybersecurity Enthusiast

Dubai, United Arab Emirates Katılım Nisan 2011
368 Takip Edilen4.3K Takipçiler
Sabitlenmiş Tweet
Kirill Firsov
Kirill Firsov@k_firsov·
Our latest research is out! If you missed a good write-up for nice vulnerabilities, I brought you one! Enjoy the reading! @FearsOff @Cloudflare
Kirill Firsov tweet media
English
10
108
501
135.8K
Kirill Firsov retweetledi
Marwan Hachem
Marwan Hachem@mar1hachem·
Kudos to the teams of @Bitrefill and @FearsOff for handling this incident with the utmost professionalism and transparency. ‘What doesn’t kill you makes you stronger’, especially in cybersecurity.
Bitrefill@bitrefill

March 1st incident report On March 1, 2026, Bitrefill was the target of a cyberattack. Based on indicators observed during the investigation - including the modus operandi, the malware used, on-chain tracing and reused IP + email addresses (!) - we find many similarities between this attack and past cyberattacks by the DPRK Lazarus / Bluenoroff group against other companies in the crypto industries. The initial access originated through a compromised employee laptop, from which a legacy credential was exfiltrated. That credential provided access to a snapshot containing production secrets. From there, the attackers were able to escalate their access to our broader infrastructure, including parts of our database and certain cryptocurrency wallets. We first detected the incident after noticing suspicious purchasing patterns with certain suppliers. We realized that our gift card stock and supply lines were being exploited. At the same time we found some of our hot wallets being drained and funds transferred to attacker-controlled wallets. The moment we identified the breach, we took all of our systems offline as part of our containment response. Bitrefill operates a global e-commerce business with dozens of suppliers, thousands of products, and multiple payment methods across many countries. Safely switching all these things off and bringing them back online is not trivial. Since the incident, our team has been working closely with top industry security researchers, incident response specialists, on-chain analysts and law enforcement to understand what happened and how we can prevent it from happening again. A sincere thank you to @zeroshadow_io, @SEAL_Org, @RecoverisTeam and @fearsoff for their rapid response and support throughout this ordeal. What about your data Based on our investigation and our logs we don’t have reason to think that customer data was the target of this breach. There is no evidence that they extracted our entire database, only that the attackers ran a limited number of queries consistent with probing to understand what there was to steal, including cryptocurrency and Bitrefill gift card inventory. Bitrefill was designed to store very little personal data. We are a store, not a crypto service provider. We don’t require mandatory KYC. When a customer chooses to verify their account - e.g. to access higher purchasing tiers or certain products - that data is kept exclusively with our external KYC provider, with no backups in our system. Still, based on database logs, we know that a subset of purchase records was accessed and we want to be transparent about that. Around 18,500 purchase records were accessed by the attackers. Those records contained limited customer information, such as email addresses, crypto payment address, and metadata including IP address. For approximately 1,000 purchases, specific products required customers to provide a name. That information is encrypted in our database. However, since the attackers may have gotten access to the encryption keys, we are treating this data as potentially accessed. Customers in this category have already been notified directly by email. At this time, based on the information currently available, we do not believe customers need to take specific action. As a precaution, we recommend remaining cautious of any unexpected communications related to Bitrefill or crypto. If this assessment changes, we will of course immediately inform those affected. What we are doing We have already significantly improved our cybersecurity practices, but vow to continue to draw learnings from this experience to make sure user and company balances and data remain maximally safe. Specifically we’re: -Continuing thorough cybersecurity reviews and pentests with multiple external experts and implementing recommendations; -Further tightening internal access controls; -Further improving logging and monitoring for faster detection and more effective response; and -Continuing to refine and test our incident response procedures and automated shutdown procedures. The bottom line Getting hit by a sophisticated attack sucks (a lot). We’ve been in business for over 10 years and it’s the first time we’ve been hit this hard. But we survived. Bitrefill was designed to limit the impact if something like this ever happened. Bitrefill remains well funded, has been profitable for several years and will absorb these losses from our operational capital. Almost everything is back to normal: payments, stock, accounts. Sales volumes are also back to normal, and we are eternally thankful to our customers for your continued confidence in us. We will continue to do our best to continue deserving your trust. Thank you!

English
0
3
5
812
Kirill Firsov
Kirill Firsov@k_firsov·
Stay safe everyone!
FearsOff Cybersecurity@FearsOff

Standing in solidarity with the UAE and all its people during these challenging times. Our thoughts are with every citizen, resident, and visitor in the Emirates as the region faces ongoing hostilities and missile threats. To everyone here - stay strong, stay safe, and know that the world is watching and supporting you. Despite these difficult moments, the UAE's advanced defense systems and swift crisis management continue to protect lives effectively, keeping the country far safer than many places facing similar or greater risks worldwide - including several Western nations where everyday security concerns can be more unpredictable. Please: • Follow all official directives from UAE authorities (NCEMA, Ministry of Interior, Ministry of Defence) without delay - shelter in place when advised, stay away from windows/open areas, and monitor updates via official channels only. • Be extremely cautious of scammers impersonating crisis management agencies, government officials, or emergency services. Never share personal/financial information or click suspicious links - verify everything through official UAE government sources. The UAE's resilience, unity, and preparedness shine through even now. Praying for de-escalation, peace, and the swift return to normalcy for this incredible nation we call home. @ncemauae @moiuae @modgovae #UAE #StaySafe \#Solidarity #MiddleEast #CrisisManagement

English
0
0
3
583
Vignesh Rajan
Vignesh Rajan@vigneshrajan_10·
@k_firsov Very well said, what are the ways to level up firsov? Any inputs?
English
1
0
1
1.2K
Kirill Firsov
Kirill Firsov@k_firsov·
So much drama today, people losing their minds over this "new" feature from Anthropic, calling it the death of pentesting and bug bounties. Even stocks tanked for companies that have nothing to do with it. Why? Because most investors in this space don't know shit about security or what Claude AI actually dropped. We have been running vulnerability scans with various AI models, including Opus 4.6 for months already. This release is basically just a handy button to run what used to be a chain of prompts doing the exact same thing. Investors: Buy back in. Bug hunters and pentesters: relax and level up with it. Anthropic’s social media team: Bravo! This clickbait worked out!
Claude@claudeai

Introducing Claude Code Security, now in limited research preview. It scans codebases for vulnerabilities and suggests targeted software patches for human review, allowing teams to find and fix issues that traditional tools often miss. Learn more: anthropic.com/news/claude-co…

English
41
50
371
41.5K
Kirill Firsov
Kirill Firsov@k_firsov·
@RoseSilicon No, not right now. Humans still pick better targets or those're missed by AI. better handle evasion in tricky envs and so on...
English
0
0
8
1.2K
Sei K.
Sei K.@RoseSilicon·
@k_firsov You think actual threat groups will replace their hackers will opus? They will do anything and everything to get inside! Even if it means writing assembler or doing things no non profit company would do normally!
English
1
0
2
1.4K
Nomad Dev
Nomad Dev@AiNomadDev·
@k_firsov Dam. What a refreshing take. Everyone was loosing their minds instead of seeing the power this could expose
English
1
0
8
1.5K
Kirill Firsov
Kirill Firsov@k_firsov·
Thanks for the article, a good reading. Many points make sense. Remember times where sqlinj were left and right? That time has gone, then was time for path traversal, still there but much less. Now we assume we should see less any other types of vulnerabilities because AI covers them, yet don't forget it's now AI who writes them in the first place. Besides that I have in mind so many scenarios where I can find a bug but AI won't, at least for now. So let's use a quote from the article: no need to panic but embrace AI
English
1
0
4
548
Het Mehta
Het Mehta@hetmehtaa·
r/cybersecurity r/netsec r/hacking r/AskNetsec r/Infosec r/ethicalhacking r/Malware r/Pentesting Don't thank me later.
English
18
173
2.4K
60.7K
Kirill Firsov
Kirill Firsov@k_firsov·
@S1r1u5_ Same. Zero seconds of real suspense, yet it sells the "I’m nervously waiting" vibe though.
English
1
0
1
446
s1r1us (mohan)
s1r1us (mohan)@S1r1u5_·
i was using claude code and it is so weird to see the llm anticipate the amount of the time it takes to run a command, then make a bash call with timeout, and continue with that. for the llm as a subject, there is no underlying anticipation like human has, its just text. the commands runs with a timeout and returns output. the model reads it. there is no such thing as gap. for me, i need to run it, then anticipate, i live through the gap and then feel the result. and also, it really doesn't have sense of time. for us core of time is change in one direction and memory modeled around it. if there is no memory, i dont have sense of time. emotions like hope, regret are related to time. everything i do plan, prepare, anticipate, think it all depends on times, its the water i swim my subjective experience. but for the llm its literally not it, its just text, "i want to run command" + "i will add timeout" + " running it" +" output"+"done". its just pattern matching, yet it models time perfectly through text. this shit is so weird and beautiful, man. so it has temporal intelligence but without any temporal subjectivity.
English
3
0
22
3K
H4x0r.DZ 🇰🇵
H4x0r.DZ 🇰🇵@h4x0r_dz·
Yey i made 500,000$ using Clawdbot in the first week
English
28
6
160
25.5K
Kirill Firsov
Kirill Firsov@k_firsov·
Stealing a violin doesn't make you a musician. Hacking/buying a cert doesn’t make you "elite" either. It just makes you a criminal... and the one who cheated on the test and still can’t do the job. If your definition of skill requires breaking the law, you don't have any. But go on with the "no cert = skid" detective work
English
0
0
4
232
b8
b8@fbi__open__up·
@k_firsov Because if you were actually elite you'd hack or social into the cert companies and issue yourself some certs without sitting the exams. So no certs does indeed mean you're unqualified and a skid.
English
1
0
2
342
Kirill Firsov
Kirill Firsov@k_firsov·
You don't need them for pentesting companies either. Most hackers don't have any certs, so why would some corporate bureaucracy tell me I'm not qualified to work with them just because I lack some XXX certificate? OK, let's wait until you get hacked and see how well that bureaucracy holds up then.
Intigriti@intigriti

| ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄| You don't need certs to be successful in bug bounty |___________| \ (•◡•) / \ / --- | |

English
4
2
75
6.8K
Kirill Firsov
Kirill Firsov@k_firsov·
@durov How about a challenge. If I enter telegram infra via pentest/redteam within 2 months once you say ok you pay me 10M and sign a long-term contract, if I won't, I pay you 100K?
English
6
1
50
40.4K
H4x0r.DZ 🇰🇵
H4x0r.DZ 🇰🇵@h4x0r_dz·
100 101 102 103 200 201 202 203 204 205 206 207 208 226 300 301 302 303 304 305 306 307 308 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 421 422 423 424 425 426 428 429 431 451 500 501 502 503 504 505 506 507 508 510 511 419 420 444 450 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 520 521 522 523 524 525 526 527 529 530 598 599
fan@NoodleHairCR7

You cannot write a random number and expect people to understand

14
3
100
17.1K
H4x0r.DZ 🇰🇵
H4x0r.DZ 🇰🇵@h4x0r_dz·
@RenwaX23 Every time I open the gold chart I do not see any good sign to go long And it keep go up every time 🤣
English
1
0
1
327