Zuk Profile picture
24 May, 3 tweets, 2 min read
The author of this post found the SolarWinds attack a 2-3 months before FireEye's announcement on December 8th 🤯reddit.com/r/Solarwinds/c… Image
The SolarWinds attackers used a system path to plant the malware in stage 2 (e.g. C:\Windows).

On smartphones we wouldn't be able to legitimately discover such attack due to sandbox restrictions on system folders 🤦‍♂️🤯

I'll wrap up with the obligatory #FreeTheSandbox 👊 Image
Original file "GetUpdateDates.vbs" does not have a ".cmd". Anyone happen to have a copy of the ".vbs.cmd" file? It's not 100% yet that it was related to the attack, another actor, or a file used by SW engineer that loves double extensions but it will be great to find out 🧐

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Zuk

Zuk Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @ihackbanme

28 Jul
For those who think that NSO is the problem - you're missing out the bigger picture:

1. There are many vendors like NSO, not just in Israel. Also in EU, APAC, N. America, and others.

2. Even if NSO shuts down tomorrow: we still have a problem: mobile attacks are scalable.
2. (cont) Once you have created a generic attack-chain, you can infect 1B+ devices. This is too powerful to keep a single barrier for attackers which already block telemetry sharing with the vendors.
3. NSO is *EASY* to find *if* a deeper access is provided to the phones.

Which leads to the bigger problem:

Why we can opt-in to be tracked by ads but can't opt-in to choose our own security apps to run with full privileges on our own phones?
Read 5 tweets
18 Jul
[Important thread 1/N]: Let that sink in for a second: almost all respected publications were under espionage.

All the sources of journalists, were exposed. If you ever spoke to a journalist (even with "Signal"/"Whatsapp") you are exposed.

THIS IS A MAJOR THREAT TO DEMOCRACY!
[2/N] If we needed another proof that we have to fix the broken mobile security permission model, here it is.

NSO's software is actually super easy to catch, but due to the lack of permissions it becomes almost impossible at scale, and NSO only has a single vendor to avoid.
[3/N] This was easy to do for NSO: they simply blocked telemetry, communications, and updates to Apple/Google: and viola! They were set. The vendors had no visibility.
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(