Alex. Turing

286 posts

Alex. Turing

Alex. Turing

@TuringAlex

Kernel Developer | Security REsearcher | Basketball Fan {Botconf | VirusBulletin | Kaspersky SAS} Speaker Current: @Xlab_qax EX: @360Netlab @Kaspersky AKA 渣兔

เข้าร่วม Aralık 2014
358 กำลังติดตาม1.2K ผู้ติดตาม
Alex. Turing
Alex. Turing@TuringAlex·
🚨The iOS exploit kit #Coruna is a fascinating case. With XLAB #PDNS, its DGA C2s are easily exposed—we grabbed four ourselves. Stats show ~4,400+ infected IPs (or researchers) per day. Surprisingly, 98.5% of these IPs are located in China, why?🤔 Happy hunting 🍷@Xlab_qax
Alex. Turing tweet mediaAlex. Turing tweet mediaAlex. Turing tweet media
English
0
0
4
193
Alex. Turing
Alex. Turing@TuringAlex·
做了一些微小的工作,make the world a better place🫡 Happy hunting 🍷@Xlab_qax
Alex. Turing tweet media
日本語
0
0
6
276
Ben
Ben@deobfuscately·
Not just bigpanzi 😄 other tv boxes also observed removing it [ "com.n2.systemservice06", "com.n2.systemservice061", "com.n2.systemservice062", "com.n2.systemservice063", "com.n2.systemservice0644", "com.android.systemservice0644", "com.a.androidsvc", "com.k.sdk", "com.abcproxy.proxysdk", "com.abcproxy.lolsdk" ]
English
1
0
3
254
Alex. Turing
Alex. Turing@TuringAlex·
🚨#Botnet In February, an invisible war broke out within #Android TV Boxes between #Bigpanzi and #Kimwolf. Bigpanzi issued the "pm uninstall" command to remove Kimwolf's APK,哈哈,果然同行是冤家😂 Happy hunting 🍷@Xlab_qax
Alex. Turing tweet media
English
1
7
43
4.5K
Alex. Turing
Alex. Turing@TuringAlex·
@birising @Xlab_qax Maybe ctf or even PLC coding practice 🤔. I’m pretty clueless when it comes to PLCs🥹🥹
English
0
0
1
121
Alex. Turing
Alex. Turing@TuringAlex·
🚨An interesting #ELF sample da2e396baf23de1881d06dd3377f84a6 on VT, packed by modified upx, appears to be a #PLC program for traffic light control, but why does it contain an embedded XOR code to establish a reverse shell to 173.180.247[.]200🤔? #IOC Happy hunting 🍷@Xlab_qax
Alex. Turing tweet mediaAlex. Turing tweet media
English
2
19
97
6.5K
Is Now on VT!
Is Now on VT!@Now_on_VT·
To date, none of the samples mentioned by hash in the Google Coruna blog or iVerify blog have been uploaded to @virustotal. Still monitoring the situation.
English
1
3
22
11.7K
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
March is already here! Only 17 days left to submit your research to @BlackHatEvents USA. If you need any preview for your submission to RE, Malware, or Threat Hunting tracks please feel free to reach out. Looking forward to see your incredible research!
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social) tweet media
English
2
2
24
3.7K
Alexandre Borges
Alexandre Borges@ale_sp_brazil·
People have a certain difficulty in being polite. I wrote a series of 10 malware analysis articles (MAS) in the past, and thousands of people downloaded, read, and learned in detail how to do it. However, few people even thanked me. A bit more than one year ago, I started a new series (Exploiting Reversing), where: [+] I wrote two articles about kernel drivers and mini filters. [+] I wrote an initial article about Chrome. [+] I wrote a first detailed article about macOS/iOS. [+] I wrote a first detailed article about Hyper-V. Besides the fact that few people even thank me, they read the articles, learn, but don't even say thank you. Worse, they use them for their research and don't cite the articles. Interestingly, they prefer to pay for expensive training at conferences rather than simply thank those who offer public knowledge to help other professionals take their own steps. Now I've started writing a new article, and my first concern is to cite the references I either used in the past or am remembering now. I try not to forget anyone, although this may happen. Of course, these unpleasant events will not stop me from continuing to write. Since we all use each other's knowledge, thanking and citing articles is a matter of respect, politeness, and courtesy. #research #cybersecurity #exploitation #exploit #malware #macOS #hyperv #windows
English
14
29
279
13.6K
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
My first @DistrictCon was a blast! ❄️ Huge thanks to the organizers and volunteers. I’m really inspired and touched by the community’s passion, and I truly enjoyed the talks, villages, and the crowd. Thanks to everyone who showed up at my talk. See you next year!
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social) tweet mediaChi-en (Ashley) Shen (@ashl3y-shen.bsky.social) tweet mediaChi-en (Ashley) Shen (@ashl3y-shen.bsky.social) tweet media
English
3
6
45
2.9K
Daniel Kelley
Daniel Kelley@danielmakelley·
Cybersecurity explained in a GIF:
English
32
167
1.4K
80.3K
Fox_threatintel
Fox_threatintel@banthisguy9349·
CTI goals for 2026. Let them be know in the comment section and maybe folks can help each other reaching these goals!
English
7
1
22
4.6K
Synthient
Synthient@synthient·
@Xlab_qax 😆 They are not fans of the research we've been told.
English
1
0
2
263
Alex. Turing
Alex. Turing@TuringAlex·
@kaspersky The decrypted payloads follow the same pattern as #Badbox 2.0: sensitive strings are AES-GZIP-Base64 encoding with an MD5-derived key. 🤔 Notably, C2 domains like📸keepgo123[.]com and gsonx[.]com📸linked to the @alldocube OTA server breach. Happy hunting 🍷@Xlab_qax
Alex. Turing tweet mediaAlex. Turing tweet mediaAlex. Turing tweet mediaAlex. Turing tweet media
Kaspersky@kaspersky

#Kaspersky researchers discovered preinstalled malware on certain models of tablets running Android – we called it Keenadu. It's a backdoor in 𝘭𝘪𝘣𝘢𝘯𝘥𝘳𝘰𝘪𝘥_𝘳𝘶𝘯𝘵𝘪𝘮𝘦.𝘴𝘰. More details are coming soon! #KasperskyGReAT #Research #Cybersecurity

English
0
7
43
3.5K