Victor just released v1.14.0 - improvements in macho module, tighter code generation in the compiler and the new “deps” command.
Congratulations to everyone involved!
github.com/VirusTotal/y...
Victor just released v1.14.0 - improvements in macho module, tighter code generation in the compiler and the new “deps” command.
Congratulations to everyone involved!
github.com/VirusTotal/y...
Especially when they reference the Jamf and OpenSource Malware blogs that attribute it properly.
Browser based ES/Mac Monitor log analyzer
- Story timelines
- Sigma rule matching
- In-depth process tree analyzer
- Much much more!
Amazing work by my coworker @txhaflaire.bsky.social
Check it out! es.decompiler.dev
#macos #malware #reverseengineering #threathunting #dfir
Ah man this got a tear out of me
Without exaggeration, one of the most epic DPRK reports ever about.gitlab.com/blog/gitlab-...
Hello world!
#MacAdmins #MacAdmin
Some of the most popular packages on the OpenClaw official registry ClawHub are malicious
@openclaw-x.bsky.social
Welcome to my winter.
Come visit.
Okay, this is friggin awesome! M.A.C.E is a great tool and I’m so proud of the work we’ve done on the #MSCP.
I’ll be honest, my compatriots do way more work than me, I’m just a tiny bit in this project. Still super cool to see here.
9to5mac.com/2026/01/24/m...
Hide your couches, Twin Cities
@craigcalcaterra.bsky.social my wife finally found them at Meijer in Toledo on her way to Michigan. They're kind of rad. Do recommend.
Updated the tracking sheet I made last year now that it's been a year — National Averages After First Year of Trump's Second Term docs.google.com/spreadsheets...
My daughter is a huge fan. Def worth a try.
Have you tried goodles?
#100DaysofYARA - Day 11
In looking at automatic YARA generation, yarGen-Go is a must. Just released by @cyb3rops, it is a rewrite and advancement from the original yarGen.
We'll look at the same malware from day 10; a targeted HavocC2 loader with decoy.
rule at bottom
1/5
#100DaysofYARA - Day 9
YARA looks for the header used in a .SCPT file used by BlueNoroff (DPRK) to target MacOS systems.
Script is delivered to victims disguised as a Zoom meeting launcher.
e.g. a7c7d75c33aa809c231f1b22521ae680248986c980b45aa0881e19c19b7b1892
Rule at end
1/3
I check daily....
TIL, I didn't know yr dump [macho] produced that data. Amazing!
#100DaysofYARA - day 5
The Cert Graveyard project reports and documents abuse code-signing including Apple issued certificates.
When reporting a certificate, we want to ensure Apple has all the identifiers they need to investigate and act.
Rule at end
1/7
Jamf Threat Labs observed a revamped MacSync Stealer variant delivered as a code-signed and notarized app. Unlike earlier drag-to-Terminal/ClickFix chains, it uses a more deceptive, hands-off approach. www.jamf.com/blog/macsync...
I have created a website, where you can share your sample analysis (via links or posts) and search samples for training based on tags and difficulty.
If you write analysis blogs, you can share them there.
samplepedia.cc
#100DaysofYARA - Day 3
This relates to obfusheader discussed by @RussianPanda95 and @c0ner0ne.
If the dev is going to use hard-coded strings, lets use them to our advantage.
This thread will demo Malcat's YARA features.
Rule at end of thread
1/5
🚨#100DaysofYARA lives!!
2 time reigning champ Yashraj
has kindly offered to take the helm for this community effort! Give the homie a follow 👊
Check the repo to contribute: github.com/100DaysofYARA
And gear up for Jan 1 when #100DaysofYARA will kick off!
If you like reading NIST special publications, I got a newly revved 800-70 for you.
csrc.nist.gov/News/2025/dr...
Jamf Threat Labs warn that fake job assessments that ask you to run terminal commands could be a social engineering scheme to deploy the FlexibleFerret malware (a malware family attributed to DPRK-aligned operators) and steal your credentials. www.jamf.com/blog/flexibl...
Another great writeup from @txhaflaire.bsky.social on a new stealer that Jamf is calling digitstealer.
www.jamf.com/blog/jtl-dig...
Oooh XProtect 5322 added XPScripts.yr. Guess they're going to start blocking malicious osascript and other interpreters now.
OBTS bound! #obtsv8
A year into Apple Intelligence, what do we know? Well your Mac knows the answers, just gotta ask the right questions.
Read “IQ Check: On-Device vs PCC — Reading the Signals Hidden on Your Mac“ by Bob Gendler on Medium: boberito.medium.com/iq-check-on-...