Drew
@bugfire.io
📤 136
📥 161
📝 373
malware detection and analysis, hunting and gathering, threat research
reposted by
Drew
Thomas Roccia :verified:
1 day ago
🤓 Happy to see that my DEFCON talk on crypto money laundering and tracking techniques was featured in the DEFCON 33 Almanac! Read it here:
https://harris.uchicago.edu/sites/default/files/the_def_con_33_hackers_almanack.pdf
0
2
1
reposted by
Drew
Allan “Ransomware Sommelier” Liska
3 days ago
I started making comics, in part, as a respite from the grind that is cybersecurity. Only hackers/scammers are everywhere. I’m no
@johnhammond.bsky.social
but here is my video on how scammers try to take advantage of creators on Kickstarter.
add a skeleton here at some point
0
3
4
This looks very interesting! 👇
add a skeleton here at some point
8 days ago
0
0
0
reposted by
Drew
CyberRaiju
9 days ago
Episode 2 of Breach Log is now available! Special thanks to Max Margolis for joining me and telling his story. If you have a story you'd like to share, get in contact and we can have some fun! breachlogpodcast [@] gmail[.]com
open.spotify.com/episode/4SDz...
loading . . .
Spotify – Web Player
https://open.spotify.com/episode/4SDz0RGNXaRVVEJNgabTyh?si=VKSgAn0mSgKrs4Q2mPyfig
0
1
1
reposted by
Drew
Thomas Roccia :verified:
16 days ago
🤓 Let me introduce you to MoltThreats: The first AI Threat Intel Feed for Ai Agents! In one week, OpenClaw became a widely used general AI agent. People started to run their own agents all over the world and connect them directly to the internet. But this […]
[Original post on infosec.exchange]
1
3
2
reposted by
Drew
Brad
17 days ago
2026-01-31 (Friday): I've posted a new traffic analysis exercise. It's Lumma in the room-ah! Join the fun at
www.malware-traffic-analysis.net/2026/01/31/i...
I mean, this guy looks like he's having fun.
0
4
2
reposted by
Drew
Brad
19 days ago
2026-01-22 (Thursday):
#RemcosRAT
infection persistent on an infected Windows host. This was caused by
#ClickFix
instructions from
#SmartApeSG
through a fake CAPTCHA page. Details of this
#Remcos
#RAT
infection are available at
www.malware-traffic-analysis.net/2026/01/06/i...
0
3
2
reposted by
Drew
Mehmet Ergene
21 days ago
I've released my new course: Practical Threat Hunting for Beginners Similar courses: $$$$ This course: $$
academy.bluraven.io/course/pract...
#ThreatHunting
#DetectionEngineering
loading . . .
Practical Threat Hunting for Beginners
Learn the core knowledge and practical skills required to perform effective threat hunting in real-world environments.
https://academy.bluraven.io/course/practical-threat-hunting-for-beginners
0
3
2
reposted by
Drew
Karsten Hahn
23 days ago
🦔 📹 New Video: Can office files be malicious without Macros? ➡️ VSTO Add-Ins ➡️ External Templates ➡️ Checklist for Office analysis
#MalwareAnalysisForHedgehogs
www.youtube.com/watch?v=RtHH...
loading . . .
Malware Analysis - Malicious MS Office files without Macros
YouTube video by MalwareAnalysisForHedgehogs
https://www.youtube.com/watch?v=RtHHckH5IsI
2
6
5
Karsten's samplepedia is a great resource for malware samples and analysis solutions!
add a skeleton here at some point
25 days ago
0
1
0
reposted by
Drew
Josh Stroschein | The Cyber Yeti
27 days ago
Is the 9-5 a thing of the past? 💀 Dhillon Kannabhiran (HITB) says the "hacker ethos" is replacing the corporate ladder. From on-demand bug hunting to working across time zones, the rules of the game have changed.
podcasts.apple.com/us/podcast/e...
loading . . .
0
2
1
reposted by
Drew
Sarah Gooding
about 1 month ago
😵💫 The Chrome extension ecosystem really is the wild west, and remains largely uncharted territory for security teams. You need visibility into what’s actually running in the browser. cc:
@campuscodi.risky.biz
@zackwhittaker.com
@bleepingcomputer.com
add a skeleton here at some point
0
9
7
Nice work from
@malware-traffic-analysis.net
in the ISC diary blog on Lumma scheduled tasks from yesterday:
isc.sans.edu/diary/Infect...
loading . . .
Infection repeatedly adds scheduled tasks and increases traffic to the same C2 domain
Infection repeatedly adds scheduled tasks and increases traffic to the same C2 domain, Author: Brad Duncan
https://isc.sans.edu/diary/Infection+repeatedly+adds+scheduled+tasks+and+increases+traffic+to+the+same+C2+domain/32628/
about 1 month ago
0
2
0
reposted by
Drew
Lenny Zeltser
about 1 month ago
I released a tool for making your website or docs easily available to AI assistants via an MCP server. This helps ensure people's AI tooling can access the latest details at the right time. For instance, this is how REMnux users now can get info about its malware analysis tools.
loading . . .
Publishing Your Website Content to AI Assistants
When people ask AI assistants about your product or project, they often get outdated information. Here's how to publish your static website content directly to AI tools using Cloudflare Workers and th...
https://zeltser.com/publishing-to-ai-assistants
0
1
2
Recommending this one, it’s a great idea! 👇
add a skeleton here at some point
about 1 month ago
0
1
0
Found the perfect product for
@selenalarson.bsky.social
- changing fingernail color on demand via iPhone! Next up: hacking Selena’s nails!
www.reuters.com/video/watch/...
loading . . .
Color-changing 'iPolish' smart nails unveiled at CES 2026
The Florida-based company digital beauty brand iPolish unveiled smart, color-changing press-on nails at CES in Las Vegas that can flip between over 400 shades in as little as five seconds. "When you w...
https://www.reuters.com/video/watch/idRW543609012026RP1/
about 1 month ago
1
0
0
reposted by
Drew
Josh Stroschein | The Cyber Yeti
about 1 month ago
📣 Happy New Year everyone! If you're looking to get some hands-on malware/reversing training to kick off the year, now is your chance! Check out this virtual training we'll be offering in March with RingZer0 👇
ringzer0.training/countermeasu...
loading . . .
The FLARE Guide to Windows Internals and Advanced Reversing
Developed by the FLARE team at Google Cloud Security, this immersive six-day virtual training provides a comprehensive deep dive into the complex world of modern Windows malware.
https://ringzer0.training/countermeasure-spring-2026-the-flare-guide-to-windows-internals/
0
2
1
reposted by
Drew
Brad
about 1 month ago
2026-01-07 (Wednesday):
#MassLogger
infection from email attachment. Copies of the emails, associated malware, indicators, and a
#pcap
of the infection traffic are available at
www.malware-traffic-analysis.net/2026/01/07/i...
0
3
1
reposted by
Drew
Maria Varmazis
about 1 month ago
So many of us set this up ages ago and have totally forgotten we're still fetching POP3 mail - time to go through and migrate things I guess. Ughh like I needed this chore right now??
add a skeleton here at some point
1
4
1
reposted by
Drew
Brad
about 1 month ago
2026-01-06 (Tuesday):
#SmartApeSG
CAPTCHA page uses
#ClickFix
technique to push
#RemcosRAT
, with
#Remcos
#RAT
C2 server at 192.144.56[.]80. A
#pcap
of the traffic, the Remcos RAT
#malware
, and a list of indicators are available at
www.malware-traffic-analysis.net/2026/01/06/i...
0
6
2
As most of us get back to work in earnest this week, I can’t help but think of the sheer chaos of 2025 and now strapping in for the dumpster that is already on fire for this year. Godspeed to all in ‘26!
about 1 month ago
0
0
0
Great idea here 👇
add a skeleton here at some point
about 1 month ago
0
1
0
reposted by
Drew
Squiblydoo
about 2 months ago
#100DaysofYARA
- Day 2 YARA rule to detect the default Delphi darkmode dib icon. I've seen this icon excessively over the years. Using @unpacme 's YARA hunting tools, I saw 0 known goodware and 800 packed junk. Rule at end 1/4
2
8
3
reposted by
Drew
Brad
about 2 months ago
2026-01-01 (Thursday):
#LummaStealer
infection with follow-up malware. A
#pcap
of the infection traffic, the
#Lumma
#Stealer
files, and a list of IOCs are available at
www.malware-traffic-analysis.net/2026/01/01/i...
0
3
1
reposted by
Drew
Kostas
about 2 months ago
𝗝𝘂𝘀𝘁 𝗹𝗮𝘂𝗻𝗰𝗵𝗲𝗱 𝗮𝘄𝗲𝘀𝗼𝗺𝗲-𝗱𝗳𝗶𝗿-𝘀𝗸𝗶𝗹𝗹𝘀 𝘄𝗶𝘁𝗵 @fr0gger_ ! Designed to save time during investigations and everyday DFIR tasks Thomas has built an excellent malware triage skill, and I’ve added a couple of timeline analysis skills to help you get started.
loading . . .
GitHub - tsale/awesome-dfir-skills: A curated collection of DFIR skills and workflows for InfoSec practitioners.
A curated collection of DFIR skills and workflows for InfoSec practitioners. - tsale/awesome-dfir-skills
https://github.com/tsale/awesome-dfir-skills
1
2
1
I listen to a LOT of security related podcasts, and this is the only one that makes me truly think when listening to the topical subjects that are discussed each week. Excellent!
add a skeleton here at some point
about 2 months ago
1
3
1
reposted by
Drew
Brad
about 2 months ago
2025-12-29 (Monday):
#ClickFix
page leads to
#NetSupportRAT
infection. Details at
www.malware-traffic-analysis.net/2025/12/29/i...
0
1
1
reposted by
Drew
Karsten Hahn
about 2 months ago
I added a python script to monitor a folder during dynamic analysis and dump changed files with timestamp
github.com/struppigel/h...
loading . . .
hedgehog-tools/Python helper scripts/monitor_and_dump_changed_files.py at main · struppigel/hedgehog-tools
Contribute to struppigel/hedgehog-tools development by creating an account on GitHub.
https://github.com/struppigel/hedgehog-tools/blob/main/Python%20helper%20scripts/monitor_and_dump_changed_files.py
0
3
1
reposted by
Drew
Karsten Hahn
about 2 months ago
🦔 📹New Video: RenPy game loads stealer, beginner friendly ➡️ strategies for finding malware in 2956 files ➡️ extracting and decompiling RenPy ➡️ remote access tool config extraction ➡️ unpacking native payload
#MalwareAnalysisForHedgehogs
#RenPy
www.youtube.com/watch?v=Fmfg...
loading . . .
Malware Analysis - RenPy game, finding malware code in 2956 files, Beginner friendly
YouTube video by MalwareAnalysisForHedgehogs
https://www.youtube.com/watch?v=Fmfg0F1e2tM
0
3
1
reposted by
Drew
GreyNoise
2 months ago
React2Shell blog update 🚨 compromised Next.js nodes are rapidly being enlisted into botnets; threat actor activity reaches ~80 source countries; and more.
#React2Shell
#Nextjs
#GreyNoise
#ThreatIntel
loading . . .
CVE-2025-55182 (React2Shell) Opportunistic Exploitation In The Wild: What The GreyNoise Observation Grid Is Seeing So Far
GreyNoise is already seeing opportunistic, largely automated exploitation attempts consistent with the newly disclosed React Server Components (RSC) “Flight” protocol RCE—often referred to publicly as...
https://www.greynoise.io/blog/cve-2025-55182-react2shell-opportunistic-exploitation-in-the-wild-what-the-greynoise-observation-grid-is-seeing-so-far
0
6
4
reposted by
Drew
Karsten Hahn
3 months ago
🦔📹 New Video: Modifying string decrypter for a ConfuserEx2 variant ➡️ Defeating antis with Harmony hooks ➡️ AsmResolver ➡️ .NET string deobfuscation
#MalwareAnalysisForHedgehogs
www.youtube.com/watch?v=sARn...
loading . . .
Malware Analysis - Defeating ConfuserEx Anti-Analysis with Hooking
YouTube video by MalwareAnalysisForHedgehogs
https://www.youtube.com/watch?v=sARnT7o8L60
0
3
1
reposted by
Drew
John Hammond
3 months ago
Full length reverse engineering with Invoke RE! Showcasing new iterations of the "Scavenger" malware, or what we saw as "ExoTickler" previously as a fake City Skylines 2 video game mod, now w/ more crypto/creds stealing and C2. Binary Ninja, x64dbg & more:
youtu.be/wFBdeak0t70
0
5
3
reposted by
Drew
Thomas Roccia :verified:
3 months ago
🎁 I am running an exclusive 'Black Friday' promo on my book Visual Threat Intelligence with code 'CYBERVTI25'! The ebook is 50% off for the next 4 days, thousands of researchers already read it! The bundle also includes the high quality illustrations from […]
[Original post on infosec.exchange]
0
2
1
reposted by
Drew
Josh Stroschein | The Cyber Yeti
3 months ago
🎙️ In the latest episode of Behind the Binary, Nino Isakovic joins us to talk about the art of deconstructing problems, building a robust RE toolkit, and his work on deobfuscating ScatterBrain! 👉
open.spotify.com/episode/2Iyy...
loading . . .
EP19 The Art of Deconstructing Problems: Tools, Tactics, and the ScatterBrain Obfuscator with Nino Isakovic
Behind the Binary by Google Cloud Security · Episode
https://open.spotify.com/episode/2IyyCq8YDm11eAAr8FEWGu?si=f3gPoTPyST-ZjtPM5PFKfA
0
2
1
reposted by
Drew
Karsten Hahn
3 months ago
I am suggesting a new malware type: the browser remote access tool (BRAT) It's a form of browser hijacker that remotely controls your browser based on server commands. Typical form: press key combos for copy-pasting URLs, opening tabs, context menu, downloading files etc
0
3
1
reposted by
Drew
Ryan Naraine
3 months ago
Podcast thoughts on Anthropic's conflicting marketing messages about Claude Code automating Chinese APT attacks
#threebuddyproblem
@jags.bsky.social
@craiu.bsky.social
loading . . .
2
3
2
reposted by
Drew
Catalin Cimpanu
3 months ago
Check Point looks at a very niche phishing group named Payroll Pirates that uses malvertising to target the users of payroll systems, credit unions, and trading platforms
cyberint.com/blog/threat-...
0
7
2
reposted by
Drew
Brad
3 months ago
2025-11-11 (Tuesday): Cryptocurrency
#scam
starts with an email. Potential victims must click through several web pages to finish the process. I recorded a video showing what I did after the last image in this post at
youtu.be/yUV7OkQqSBk
More info on this activity at
github.com/PaloAltoNetw...
1
3
1
reposted by
Drew
John Hammond
3 months ago
Yesterday folks got a phishing email for a fake DMCA report-- myself included. Caught me at a good time so I could record poking at the scam and the malware it leads to: ultimately infostealer malware (the usual) from a fake domain & clearly AI slop site:
youtu.be/IzKjL16-sgY
0
16
2
reposted by
Drew
GreyNoise
3 months ago
We deployed MCP honeypots to understand how threat actors engage with AI middleware exposed to the internet. What we observed was unexpected. Full analysis ⬇️
#GreyNoise
#AI
#AISecurity
#MCP
#MCPSecurity
#Cybersecurity
#ThreatIntel
loading . . .
What GreyNoise Learned from Deploying MCP Honeypots
GreyNoise deployed MCP honeypots to see what happens when AI middleware meets the open internet — revealing how attackers interact with this new layer of AI infrastructure.
https://www.greynoise.io/blog/deploying-mcp-honeypots
0
15
9
reposted by
Drew
Kim Zetter
4 months ago
Here's the Wired story
www.wired.com/story/peter-...
loading . . .
Ex-L3Harris Cyber Boss Pleads Guilty to Selling Trade Secrets to Russian Firm
Peter Williams, a former executive of Trenchant, L3Harris' cyber division, has pleaded guilty to two counts of stealing trade secrets and selling them to an unnamed Russian software broker.
https://www.wired.com/story/peter-williams-trenchant-trade-secrets-theft-russian-firm/
1
13
4
I’m convinced there’s no better time of the week than Saturday morning
4 months ago
0
0
0
Well done AI…
add a skeleton here at some point
4 months ago
0
0
0
reposted by
Drew
Kyle Eaton
4 months ago
PDFs have been a constant struggle and I’ve found that this helps. Might be a little biased tho
add a skeleton here at some point
1
4
2
reposted by
Drew
Josh Stroschein | The Cyber Yeti
4 months ago
🎙️ Ever wonder what it takes to secure a massive event like Black Hat? 🤔 Mark Overholser from Corelight joins us to pull back the curtain on how the Black Hat Network Operations Center (NOC) is built, monitored, and the craziest things that have shown up! Spotify:
open.spotify.com/episode/2F4x...
loading . . .
EP17 What Lurks Beneath: Building a Robust Network at Black Hat with Mark Overholser
Behind the Binary by Google Cloud Security · Episode
https://open.spotify.com/episode/2F4x1mA97pt2gzyGuiwLxq
0
3
1
reposted by
Drew
Graham Cluley
4 months ago
Normally when we hear about a malware operation being disrupted, it's because it has been shut down by the cops. But in the case of Lumma Stealer, it appears to have been sabotaged by other cybercriminals. Read more on the Fortra blog:
www.fortra.com/blog/cybercr...
loading . . .
Cyber-criminals Turn on Each Other: The Story of Lumma Stealer's Collapse
A malware-as-a-service operation used to steal passwords and sensitive data has been sabotaged by other cyber-criminals.
https://www.fortra.com/blog/cybercriminals-turn-each-other-story-lumma-stealers-collapse
0
8
3
reposted by
Drew
ThreatInsight
4 months ago
⚠️ Attackers are moving beyond credentials. Our blog shows they’re increasingly weaponizing
#OAuth
applications to maintain persistent access in the cloud—even after
#passwords
are reset or
#MFA
is enforced. This persistence poses a growing risk to modern enterprises.
1
1
1
reposted by
Drew
Josh Stroschein | The Cyber Yeti
4 months ago
🔥 Live stream with Hahna Kane begins in ~1 hour, join us on YouTube!
youtube.com/live/HG_JsFq...
loading . . .
Practical Applications in Machine Learning with Hahna Kane Latonick
Hahna Kane Latonick joins the live stream to talk about machine learning, reverse engineering, program analysis and more! We'll explore practical approaches ...
https://youtube.com/live/HG_JsFq7cyg?feature=share
0
2
1
reposted by
Drew
Jimmy Wylie
4 months ago
Our DEF CON33 ICS Village talk is now on YouTube!
@sam-hans0n.bsky.social
and I share stories of malware we discovered while searching for ICS threats, and discuss our approach to assessing their reputation. Don't Cry Wolf: Evidence-Based Assessment of ICS Threats
loading . . .
DEF CON 33 - Don’t Cry Wolf: Evidence based assessments of ICS Threats - Jimmy Wylie & Sam Hanson
CS Malware is rare. Yet, ICS Malware like FrostyGoop and TRISIS, and related discoveries like COSMICENERGY, were all found on VirusTotal, so analysts still hunt for novel ICS Malware in public malware repositories. In the process, they discover all kinds of tools: research, CTFs, obfuscated nonsense
https://www.youtube.com/watch?v=6U_CepoMSl4
0
6
6
reposted by
Drew
GreyNoise
4 months ago
Amid the security incident involving F5 BIG-IP announced today, GreyNoise is sharing recent insights into activity targeting BIG-IP to aid in defensive posturing. The anomalies reported in our blog may not necessarily relate to the 15 Oct incident. ⬇️
loading . . .
GreyNoise’s Recent Observations Around F5
Amid the security incident involving F5 BIG-IP announced on 15 October 2025, GreyNoise is sharing recent insights into activity targeting BIG-IP to aid in defensive posturing.
https://www.greynoise.io/blog/recent-observations-around-f5
0
7
4
Load more
feeds!
log in