Sudheer Varma's Avatar

Sudheer Varma

@pwnisher

https://twitter.com/0xpwnisher Red Team at Amazon

191
Followers
106
Following
3
Posts
01.11.2024
Joined
Posts Following

Latest posts by Sudheer Varma @pwnisher

It sure is!

16.03.2025 18:07 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Inside a New OT/IoT Cyberweapon: IOCONTROL Team82 obtained a sample of a custom-built IoT/OT malware called IOCONTROL used by the Iran-affiliated attackers to attack Israel- and U.S.-based OT/IoT devices.

Inside a New OT/IoT Cyberweapon: IOCONTROL

13.12.2024 07:00 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever w...

Excited that we @volexity.com are able to share a writeup of one of our most interesting incidents! This case involves:

* A 0-day exploit
* Physical trips to the customer site to determine root cause
* Compromise via Wi-Fi.

www.volexity.com/blog/2024/11...

#nearestneighbor #threatintel

22.11.2024 15:05 πŸ‘ 46 πŸ” 17 πŸ’¬ 3 πŸ“Œ 0
Preview
Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine ESET researchers analyzed previously unknown Linux backdoors that are connected to known Windows malware used by the China-aligned Gelsemium group, as well as to Project Wood.

#ESET research has identified #Linux malware samples, one of which we named #WolfsBane and attribute with high confidence to #Gelsemium. This πŸ‡¨πŸ‡³ China-aligned APT group, active since 2014, has not previously been publicly reported to use Linux malware. www.welivesecurity.com/en/eset-rese... 🧡(1/6)

21.11.2024 10:30 πŸ‘ 21 πŸ” 12 πŸ’¬ 1 πŸ“Œ 2
Preview
Anyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany More than 3 billion phone coordinates collected by a US data broker expose the detailed movements of US military and intelligence workers in Germanyβ€”and the Pentagon is powerless to stop it.

WIRED has tracked thousands of US military & intel personnel coming & going from classified sites, incl. NSA hubs & nuclear vaults. We know where they sleep, what they eat, and which brothels they visit.

It's an ocean of blackmail & national secrets within reach of every spy agency in the world.

20.11.2024 04:00 πŸ‘ 4197 πŸ” 1719 πŸ’¬ 160 πŸ“Œ 253

Post a pic YOU took to bring some zen to the timeline.

18.11.2024 11:00 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Reverse Engineering iOS 18 Inactivity Reboot Wireless and firmware hacking, PhD life, Technology

How does the new iOS inactivity reboot work? What does it protect from?

I reverse engineered the kernel extension and the secure enclave processor, where this feature is implemented.

naehrdine.blogspot.com/2024/11/reve...

17.11.2024 21:42 πŸ‘ 279 πŸ” 107 πŸ’¬ 12 πŸ“Œ 11

What sample is that on your IDA

09.11.2024 23:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar From repeatedly crippling thousands of gas stations to setting a steel mill on fire, Predatory Sparrow’s offensive hacking has now targeted Iranians with some of history's most aggressive cyberattac...

Israel-linked hacker group Predatory Sparrow has carried out some of the most disruptive hacking of civilian targets ever. Yet they also claim to limit their cyberattacks' harm. I dug into the recent history of this hyper-aggressive, contradictory player in cyberwar.

www.wired.com/story/predat...

25.01.2024 15:00 πŸ‘ 6 πŸ” 2 πŸ’¬ 1 πŸ“Œ 2
Preview
The Sophos kernel implant, 'hack-back' implications, CIA malware in Venezuela - Security Conversations Three Buddy Problem – Episode 19: We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, […]

The Three Buddy Problem podcast Episode 19 just published! We explore Ivan Kwiatkowski’s essay on the limits of threat intel, Sophos using kernel implants to surveil Chinese hackers, the concept of β€˜hack-back’, geopolitical layers of cyber espionage&more: securityconversations.com/episode/the-...

03.11.2024 19:24 πŸ‘ 2 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Post image

Sophos engineers preparing their revenge against the Chengdu hackers #PacificRim

01.11.2024 10:29 πŸ‘ 15 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0