Malum's Avatar

Malum

@pertinaxmalum

Senior SOC engineer. Former intel. Interested in cloud, PowerShell, detection engineering and threat hunting. Owner of the Black Hat Labs.

145
Followers
687
Following
11
Posts
03.11.2024
Joined
Posts Following

Latest posts by Malum @pertinaxmalum

Post image

I made a Fjällräven backpack from an IKEA bag! And you know I don't gatekeep-- the pattern is FREE and the most glorious sewing instructions I've ever created. You can use regular canvas, too. #ikea #Fjällräven

beckystern.com/2025/05/25/s...

17.08.2025 14:40 👍 258 🔁 69 💬 8 📌 7
Andrew Kadel @DrewKadel@social.coop

My daughter, who's had a degree in computer science for 25 years, posted this about ChatGPT on Facebook. It's the best description I've seen.

Something that seems fundamental to me about ChatGPT, which gets lost over and over again:

When you enter text into it, you're asking "What would a response to this sound like?"

If you put in a scientific question, and it comes back with a response citing a non-existent paper with a plausible title, using a real journal name and an author name who's written things related to your question, it's not being tricky or telling lies or doing anything at all surprising! This is what a response to that question would sound like! It did the thing!

But people keep wanting the "say something that sounds like an answer" machine to be doing something else, and believing it *is* doing something else.

It's good at generating things that sound like responses to being told it was wrong, so people think that it's engaging in introspection or looking up more information or something, but it's not, it's only, ever, saying something that sounds like the next bit of the conversation.

Andrew Kadel @DrewKadel@social.coop My daughter, who's had a degree in computer science for 25 years, posted this about ChatGPT on Facebook. It's the best description I've seen. Something that seems fundamental to me about ChatGPT, which gets lost over and over again: When you enter text into it, you're asking "What would a response to this sound like?" If you put in a scientific question, and it comes back with a response citing a non-existent paper with a plausible title, using a real journal name and an author name who's written things related to your question, it's not being tricky or telling lies or doing anything at all surprising! This is what a response to that question would sound like! It did the thing! But people keep wanting the "say something that sounds like an answer" machine to be doing something else, and believing it *is* doing something else. It's good at generating things that sound like responses to being told it was wrong, so people think that it's engaging in introspection or looking up more information or something, but it's not, it's only, ever, saying something that sounds like the next bit of the conversation.

The only thing ChatGPT ever does.

14.08.2025 19:35 👍 3549 🔁 1493 💬 43 📌 50

This is a particularly gnarly backdoor: www.nextron-systems....

04.08.2025 16:10 👍 2 🔁 1 💬 1 📌 0

Slides from my "Using PowerShell to Explore Windows" workshop at @steelcon.info 2025
files.speakerdeck.com/presentation...

14.07.2025 15:21 👍 7 🔁 3 💬 0 📌 0
Preview
Abusing Windows, .NET quirks, and Unicode Normalization to exploit DNN (DotNetNuke) › Searchlight Cyber A pre-authentication vulnerability exists within DotNetNuke versions 6.0 to 10.0.1, assigned CVE-2025-52488, that allows attackers to steal NTLM hashes.

slcyber.io/assetnote-se...

14.07.2025 19:53 👍 2 🔁 1 💬 0 📌 1
Preview
Datadog Detect: Scale your Security Operations with Detection Engineering | Datadog See metrics from all of your apps, tools & services in one place with Datadog's cloud monitoring as a service solution. Try it for free.

I'm so excited to announce that Datadog Security Research is launching a FREE, fully-online, Detection Engineering focused conference called Datadog Detect!

bit.ly/datadog-detect

Our lineup is incredible with experts in the field of detection, response and threat intelligence.

10.05.2025 18:14 👍 10 🔁 3 💬 0 📌 0
Tool Analysis Result Sheet

1/
Absolutely love this resource 💙
Just came across this gem from JPCERT
👉 jpcertcc.github.io/ToolAnalysis...

It maps forensic artifacts left behind by tools used for lateral movement or credential dumping. Super detailed.

13.05.2025 18:00 👍 5 🔁 3 💬 2 📌 0
Preview
LLMs can't stop making up software dependencies and sabotaging everything : Hallucinated package names fuel 'slopsquatting'

LLMs hallucinating nonexistent software packages with plausible names leads to a new malware vulnerability: "slopsquatting."

12.04.2025 22:31 👍 1340 🔁 387 💬 33 📌 143
Post image

To check for existing bypass configurations, try:

Connect-ExchangeOnline
Get-MailboxAuditBypassAssociation -ResultSize Unlimited | Where-Object { $_.AuditBypassEnabled -eq $true }

To alert, try:

CloudAppEvents
| where ActionType == @"Set-MailboxAuditBypassAssociation"

08.04.2025 05:24 👍 8 🔁 1 💬 0 📌 0
Preview
This is the FBI. China's Volt Typhoon is on your network : Power utility GM talks to El Reg about getting that call and what happened next

A critical infra supplier in Massachusetts got a genuine call from the FBI warning of a Volt Typhoon intrusion. A manager said "Go f-yourself" after the agent tried to get him to click a link in an email. Great story by @jessicalyons.bsky.social. #infosec www.theregister.com/2025/03/12/v...

13.03.2025 06:56 👍 13 🔁 3 💬 1 📌 0
Preview
Silk Typhoon targeting IT supply chain | Microsoft Security Blog Silk Typhoon is a Chinese state actor focused on espionage campaigns targeting a wide range of industries in the US and throughout the world. In recent months, Silk Typhoon has shifted to performing I...

Microsoft Threat Intelligence identified a shift in tactics by Silk Typhoon, a Chinese espionage group, now targeting common IT solutions like remote management tools and cloud applications to gain initial access.

www.microsoft.com/en-us/securi...

05.03.2025 12:28 👍 6 🔁 4 💬 0 📌 1
Post image Post image Post image Post image

Recorded Future's malicious infrastructure report is out

www.recordedfuture.com/research/202...

02.03.2025 01:38 👍 13 🔁 5 💬 1 📌 0

About 2 weeks after I wrote a blog post and warned about device code usage. agderinthe.cloud/2025/01/31/i...

17.02.2025 07:37 👍 6 🔁 2 💬 0 📌 0
Preview
Storm-2372 conducts device code phishing campaign | Microsoft Security Blog Microsoft Threat Intelligence Center discovered an active and successful device code phishing campaign by a threat actor we track as Storm-2372. Our ongoing investigation indicates that this campaign ...

IT Admins have you already enabled the CA policy to limit device code in your organization? If you were waiting for a reason to prioritize doing it this might help.

www.microsoft.com/en-us/securi...

#security #microsoft #entra #identity

#

14.02.2025 03:05 👍 16 🔁 6 💬 2 📌 0

Forgive your Entra ID admins, for they know not what they do. In most orgs, IAM is not owned by security. Therefore, security must inform IAM.

You MUST defend against modern cloud phishing techniques for INITIAL ACCCESS. Here are 4 of the top vectors when MFA is enforced:

10.02.2025 12:51 👍 38 🔁 9 💬 2 📌 1
Preview
Attacking Entra Metaverse: Part 1 This is part one in a two (maybe three…) part series regarding attacker tradecraft around the syncing mechanics between Active Directory…

A new fun way to set shadow credentials
posts.specterops.io/attacking-en...

13.12.2024 16:48 👍 9 🔁 6 💬 0 📌 0
Preview
Intune Attack Paths — Part 1 Intune is an attractive system for adversaries to target…

In Part 1 of my Intune Attack Paths series, I discuss the fundamental components and mechanics of Intune that lead to the emergence of attack paths: posts.specterops.io/intune-attac...

15.01.2025 17:33 👍 42 🔁 19 💬 2 📌 0
Preview
GitHub - cisagov/kev-data: Mirror of cisa.gov/kev data files Mirror of cisa.gov/kev data files. Contribute to cisagov/kev-data development by creating an account on GitHub.

CISA has formally brought its KEV database to GitHub, allowing easier access to the data without having to scrape the official website every few hours

github.com/cisagov/kev-...

Via Socket: socket.dev/blog/cisa-br...

30.01.2025 09:45 👍 39 🔁 15 💬 2 📌 2
Post image

🧵 How bad were ransomware attacks against healthcare in 2024? Bad.

As of right now, there were 372 *publicly reported* ransomware attacks against healthcare providers in 2024. Currently down from 2023 (377). BUT there can be a 1-2 month delay in reporting, so the final number will increase.

26.01.2025 10:32 👍 32 🔁 8 💬 1 📌 1
Preview
Process Hollowing on Windows 11 24H2 Process Hollowing (a.k.a. RunPE) is probably the oldest, and the most popular process impersonation technique (it allows to run a malicious executable under the cover of a benign process). It is us…

In case if you wonder what broke #ProcessHollowing on Windows 11 24H2, I have something for you: hshrzd.wordpress.com/2025/01/27/p...

26.01.2025 23:55 👍 58 🔁 38 💬 0 📌 1
Microsoft Expanded Cloud Logs Implementation Playbook | CISA

If your company runs Exchange Online and/or Microsoft 365 have a look at CISA's latest publication: Microsoft Expanded Cloud Logs Implementation Playbook.

The report includes KQL, SPL and Powershell code to perform incident response.

www.cisa.gov/resources-to...

20.01.2025 19:08 👍 4 🔁 1 💬 0 📌 0

Using PowerShell with Microsoft Graph – Yet Another Security Blog garybushey.com/2025/...

#MicrosoftSentinel #Cybersecurity #MicrosoftSecurity #Security #DefenderXDR

15.01.2025 16:30 👍 0 🔁 1 💬 0 📌 0
Preview
InfoSec Deep Dive • A podcast on Spotify for Creators InfoSec DeepDive simplifies information security, turning complex topics into digestible discussions. Powered by NoteBookLM, episodes are scripted from curated sources and notes to deliver accurate,…

I just finished editing the next episode of the "InfoSec Deep Dive" podcast. It's likely one of the best ones I've ever made!

It'll be on malware analysis. It covers everything you need to know to get started and even some advanced topics!

🔗Follow here so you don't miss it:

17.01.2025 01:30 👍 5 🔁 1 💬 1 📌 0

Sorry, mate. I've been through that a few times too. It never gets any easier. I'll take your advice and go hug my two now.

18.12.2024 09:41 👍 1 🔁 0 💬 0 📌 0

I don’t normally get worked up about the naming threat actors thing.

But the Volt & Salt Typhoon is a disaster as it’s so hard for non-specialists to tell them apart:

- Salt is Snowden style espionage by China against US

- Volt is a direct 🇨🇳 military threat to degrade western infrastructure 1/2

12.12.2024 20:47 👍 131 🔁 39 💬 7 📌 6
Preview
Black Basta Gang Uses MS Teams, Email Bombing to Spread Malware Follow us on Bluesky, Twitter (X) and Facebook at @Hackread

Black Basta Ransomware Uses MS Teams, Email Bombing to Spread Malware

11.12.2024 06:12 👍 11 🔁 4 💬 0 📌 0
Preview
Chinese hackers use Visual Studio Code tunnels for remote access Chinese hackers targeting large IT service providers in Southern Europe were seen abusing Visual Studio Code (VSCode) tunnels to maintain persistent access to compromised systems.

Chinese hackers targeting large IT service providers in Southern Europe were seen abusing Visual Studio Code (VSCode) tunnels to maintain persistent access to compromised systems.

www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.blee...

11.12.2024 07:10 👍 5 🔁 1 💬 0 📌 0

Awesome work by Lance, clear write-up on the issue, the solution, a PR to ROADtools and more tradecraft!

10.12.2024 20:24 👍 16 🔁 4 💬 0 📌 0