y0sh1mitsu's Avatar

y0sh1mitsu

@y0sh1mitsu

DFIR Consultant - GCFR | https://linktr.ee/y0sh1mitsu

146
Followers
291
Following
1
Posts
12.11.2024
Joined
Posts Following

Latest posts by y0sh1mitsu @y0sh1mitsu

Preview
πŸ”₯ We're hiring Senior and Lead Offensive Security Engineers at Humana's Cyber Threat Simulation Program! | Robert Pimentel πŸ”₯ We're hiring Senior and Lead Offensive Security Engineers at Humana's Cyber Threat Simulation Program! πŸ”₯ You'll be: πŸ’₯ Running high-fidelity threat simulations πŸ’₯ Working side-by-side with our Red Team on covert campaigns πŸ’₯ Partnering on Purple Team ops to emulate real threat actors πŸ’₯ Targeting and testing specific countermeasure stacks You'll have full access to HTB Pro Labs, role-based certification paths, conference and training budgets, and Fridays set aside for R&D (LLMs, malware development, AI, and more). πŸ‘Š What we're looking for: - Python-fluent operators who can turn threat intel into test cases. - Folks who don't just ask "can we test this?" - You already did. - People who thrive in remote, high-autonomy roles. - Engineers and leaders who want to influence detection and defense at scale πŸ”— Links: πŸ‘‰ Senior Offensive Security Engineer: https://lnkd.in/d7SH9BFC πŸ‘‰ Lead Offensive Security Engineer: https://lnkd.in/d_dtjGmr Feel free to message me if you have any questions, and repost for others who might be interested! #RedTeam #OffensiveSecurity #BugBounty #PenetrationTesting #AdversarySimulation

The job posts here are a good example of how companies are starting to recognize the value of students learning from OST2 and seek self-starter employees who are using our classes to skill up! www.linkedin.com/posts/piment...

11.07.2025 12:06 πŸ‘ 1 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
Week 25 – 2025 Use the discount code thisweekin4n6 for 15% off any class at Cyber5w.Use the code PM15 or click this link for 15% your next Hexordia classTakes a class with me! Akash PatelDigging into Google Analy…

Week 25 - 2025 #DFIR
thisweekin4n6.com/2025/06/22/w...

22.06.2025 12:01 πŸ‘ 2 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Preview
Expression Payloads Meet Mayhem - Ivanti EPMM Unauth RCE Chain (CVE-2025-4427 and CVE-2025-4428) Keeping your ears to the ground and eyes wide open for the latest vulnerability news at watchTowr is a given. Despite rummaging through enterprise code looking for 0days on a daily basis, our interest...

When the vulnerability in third-party code isn't in the third-party code:

labs.watchtowr.com/expression-p...

15.05.2025 16:10 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

Congratulations to all of the Volatility contributors - this was no small feat! We are proud to be a sustaining sponsor of this important open-source project that remains the world’s most widely used memory forensics platform. #dfir

16.05.2025 15:20 πŸ‘ 10 πŸ” 7 πŸ’¬ 0 πŸ“Œ 0
ESET takes part in global operation to disrupt Lumma Stealer Our intense monitoring of tens of thousands of malicious samples helped this global disruption operation

#ESETresearch, in collaboration with #Microsoft, BitSight, Lumen, Cloudflare, CleanDNS, and GMO Registry, has helped disrupt #LummaStealer – a notorious malware-as-a-service infostealer. @jakubtomanek.bsky.social www.welivesecurity.com/en/eset-rese... 1/5

21.05.2025 16:16 πŸ‘ 10 πŸ” 7 πŸ’¬ 1 πŸ“Œ 0
Post image

Dropping new research - this time on recent #XDSpy operations. Out of hundreds of LNK files leveraging ZDI-CAN-25373, we isolated a tiny cluster using an additional LNK parsing trick, leading us to uncover a multi-stage infection chain actively targeting government entities

16.06.2025 12:51 πŸ‘ 1 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
From Alert to Insight: The Art of Incident Qualification - y0sh1mitsu's blog A short guide for those wishing to qualify an incident

How you qualify an incident determines how well you’ll contain it.

I broke down my real-world process for getting accurate, useful answers fast, even when the info is chaotic or wrong.

If you’re in DFIR, this one’s for you !

y0sh1mitsu.github.io/posts/qualif...

27.05.2025 06:22 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Check out our new report on a TA4557 intrusion.

Make sure your team that handles resumes recognises these fake lures!

02.12.2024 12:48 πŸ‘ 6 πŸ” 5 πŸ’¬ 0 πŸ“Œ 2
Post image

Investments in EU cybersecurity startups is lagging way behind both the US and Israel... by a lot-lot!

PDF: www.tikehaucapital.com/~/media/File...

13.04.2025 10:57 πŸ‘ 11 πŸ” 7 πŸ’¬ 1 πŸ“Œ 0
Preview
Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers | TechCrunch The Taiwanese hardware maker says it has no plans patch the flaws impacting legacy router models

Zyxel has no plans to release patches for two zero-days under attack and is advising customers to replace vulnerable routers. The company says these devices have been β€œEOL for years” - but the devices are not on Zyxel’s EOL page, and some are still available to buy techcrunch.com/2025/02/05/r...

05.02.2025 10:10 πŸ‘ 28 πŸ” 15 πŸ’¬ 1 πŸ“Œ 1
Not so boring Android malware A collection of interesting and diverse Android malware samples

The best way to start with malware reverse engineering is to start reverse engineering malware.

There’s a ton of free samples everywhere (shout out to @vxundergroundre.bsky.social).

If you want to start with Android take a look at the link below

maldroid.github.io/android-malw...

10.12.2024 22:55 πŸ‘ 15 πŸ” 3 πŸ’¬ 1 πŸ“Œ 0

πŸš€ New OpenRelik release

Role-based access control, folder sharing, database improvements, optimisations for file listings, chunked file uploads, bug fixes and refactoring efforts to improve stability.

πŸ“ https://openrelik.org/changelog/
πŸ”— https://discord.gg/hg652gktwX

#DFIR

27.11.2024 15:41 πŸ‘ 4 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Preview
Bootkitty: Analyzing the first UEFI bootkit for Linux ESET's discovery of the first UEFI bootkit designed for Linux sendss an important message: UEFI bootkits are no longer confined to Windows systems alone.

#ESETresearch reveals the first Linux UEFI bootkit, Bootkitty. It disables kernel signature verification and preloads two ELFs unknown during our analysis. Also discovered, a possibly related unsigned LKM – both were uploaded to VT early this month. www.welivesecurity.com/en/eset-rese... 🧡

27.11.2024 08:34 πŸ‘ 29 πŸ” 17 πŸ’¬ 1 πŸ“Œ 1
Preview
Vx Underground The largest collection of malware source code, samples, and papers on the internet.

Good morning, or evening.

After a months, we're finally releasing the Dispossessor ransomware leaks. They're now available to download.

Please exercise extreme caution. This archive contains ransomware payloads.

vx-underground.org/Archive/Disp...

25.11.2024 03:34 πŸ‘ 59 πŸ” 12 πŸ’¬ 0 πŸ“Œ 1
Preview
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever w...

Excited that we @volexity.com are able to share a writeup of one of our most interesting incidents! This case involves:

* A 0-day exploit
* Physical trips to the customer site to determine root cause
* Compromise via Wi-Fi.

www.volexity.com/blog/2024/11...

#nearestneighbor #threatintel

22.11.2024 15:05 πŸ‘ 46 πŸ” 17 πŸ’¬ 3 πŸ“Œ 0
Preview
DPRK IT Workers | A Network of Active Front Companies and Their Links to China SentinelLabs has identified multiple deceptive websites linked to businesses in China fronting for North Korea's fake IT workers scheme.

🚨 New Research Drop:

πŸ‡°πŸ‡΅ DPRK IT Workers | A Network of Active Front Companies and Their Links to China

Summary:
βšͺ Newly Disrupted Front Companies by USG
βšͺ Impersonating US based software and tech orgs
βšͺ Links to still-active front orgs, CN association

Report:
www.sentinelone.com/labs/dprk-it...

21.11.2024 15:00 πŸ‘ 37 πŸ” 23 πŸ’¬ 1 πŸ“Œ 3
Post image

Cyberattackers may have compromised lots of organizations by exploiting two zero-day vulnerabilities found in widely used Palo Alto Networks systems. unit42.paloaltonetworks.com/cve-2024-001...

22.11.2024 09:54 πŸ‘ 17 πŸ” 9 πŸ’¬ 0 πŸ“Œ 0
Post image

Podcast: risky.biz/RBNEWS364/
Newsletter: news.risky.biz/risky-biz-ne...

-US charges five Scattered Spider members
-Apple fixes macOS zero-days
-T-Mobile finally stops a breach
-US takes down PopeyeTools carding portal
-Thailand throws out NSO lawsuit
-Microsoft develops something dumb, part 9,136

22.11.2024 10:40 πŸ‘ 20 πŸ” 10 πŸ’¬ 1 πŸ“Œ 0
Post image

Uncover one of Volexity's toughest cases!

Join Steven Adair at #CYBERWARCON as he details how his team traced a major incident to a Russian APT, tackling zero-day exploits and stealthy tactics.

Don’t miss itβ€”grab your ticket! 🎟️
www.cyberwarcon.com/registration

18.11.2024 22:35 πŸ‘ 20 πŸ” 5 πŸ’¬ 1 πŸ“Œ 1
Post image

πŸ“‘ Detection Lists πŸ“‘

github.com/mthcht/awesome…

#ThreatHunting #DFIR #SOC

10.11.2024 06:20 πŸ‘ 14 πŸ” 6 πŸ’¬ 0 πŸ“Œ 1
Preview
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA In July 2024, Volexity identified exploitation of a zero-day credential disclosure vulnerability in Fortinet’s Windows VPN client that allowed credentials to be stolen from the memory of the client’s ...

@volexity.bsky.social has published a blog post detailing variants of LIGHTSPY & DEEPDATA malware discovered in the summer of 2024, including exploitation of a vulnerability in FortiClient to extract credentials from memory. Read more here: www.volexity.com/blog/2024/11...

15.11.2024 20:02 πŸ‘ 37 πŸ” 27 πŸ’¬ 0 πŸ“Œ 1

Hello! πŸ‘‹ Joining all the cool kids over here. Follow @13Cubed.bsky.social for 13Cubed content.

14.11.2024 15:38 πŸ‘ 10 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

#Linux lacks a resource like the Windows Master File Table ($MFT). I've developed this #Velociraptor artifact to collect metadata from files and folders recursively in selected paths to create a bodyfile. This may bring an MFT-like feel to filesystem analysis. #dfir

github.com/chrisdfir/Ve...

12.11.2024 21:00 πŸ‘ 31 πŸ” 14 πŸ’¬ 3 πŸ“Œ 0
Post image

Supply chain malware from an infected game mod 🀯😱 Long-form reverse engineering and a WILD ride: Binary Ninja, x64dbg, 010 Editor, PEB walking, reworking API function hashing in Python, DLL search-order hijacking, hooked functions & more. MASSIVE video: jh.live/bvyklJ5Wie0

14.11.2024 14:00 πŸ‘ 76 πŸ” 7 πŸ’¬ 2 πŸ“Œ 0
Preview
Improving Private Signal Calls: Call Links & More If you love group calls on Signal, but don’t want to create a group chat for every combination of your friends or colleagues, you’re in luck. Today we’re launching call links: Share a link with anyone on Signal and in just a tap or click they can join the call. No group chat required.

Signal just released a ton of new call features that would be perfect for organizing, hint hint.

signal.org/blog/call...

11.11.2024 18:37 πŸ‘ 8 πŸ” 5 πŸ’¬ 0 πŸ“Œ 1