Cyber Threat Intelligence, (China) OSINT SME
Founder, CEO @EPCYBER
Former Mil. Intel, MOD
Oxford Alumi
CCNA, CCSK, CISO
Jan 12 • 5 tweets • 2 min read
The Chinese are at it again..(aliexpress) its an rj45 adapter, but with SPI flash memory chip acting as storage with .exe recognized as malware for windows, and of course sold over 10k times... 🤦♀️
Your long awaited exe, its injecting code into processes, evading virtual machines, modifying proxy settings, extracting keystrokes, and using Russian-language elements to obscure its origin or intent. ENJOY malware analysts
Large storage on the flash memoryhybrid-analysis.com/sample/e3f57d5…
Oct 27, 2022 • 4 tweets • 2 min read
GEOINT / OSINT (🎃🧵🔎) 1. You probably didn't know this but you can create your own custom maps here, why this is interesting, because custom means unique information that can be useful for OSINT and GEOINT investigations. 2. What you can also do is as any good OSINT practice to combine different tools and sources together, like Shodan or other interactive maps to get better insights. Simply search for "site:google.com inurl:maps intext:"was made with Google My Maps"" query.
Oct 26, 2022 • 10 tweets • 4 min read
How to properly utilize git-sites for OSINT Investigations and research - My guide with tips and tricks (a 🧵) 🔎 1. Not all github.io instances are publicly indexed by search engines, one way to find interesting tools developed for OSINT is to utilize dorks and queries
site:*.github.io + "osint" OR "tool" OR "search engine" OR anything else you're looking for.