Mark Lechtik

Senior Reverse Engineer (FLARE), Google (Mandiant) | Backdoors, rootkits, bootkits | CTI tinkerer | Views are my own.

#IStandWithUkraine

2023-01-19

Fortinet has published an advisory on active exploitation of CVE-2022-42475 in the wild. My colleagues at Mandiant and myself followed up with analysis of a backdoor associated with this activity and targets Fortinet devices, dubbed BOLDMOVE.
Based on artefacts from a Windows variant of BOLDMOVE (54bbea35b095ddfe9740df97b693627b) that allude to a UTC+8 timezone and usage of the GBK character encoding in the actors environment, it is assessed with low confidence that the activity is affiliated to a China-nexus
threat actor.

mandiant.com/resources/blog/ch

2022-11-20

This is my account on Twitter - twitter.com/_marklech_ - verified by Twittodon.com

(for verification, don't follow me there)

2022-11-20

@maldr0id I once sat in a meeting between a malware RE team that I led with an executive who started it with the premise "so now that malware reverse engineering has become a commodity..."

2022-11-20

@r00tbsd @Sebdraven one day we will translate it to English

Mark Lechtik boosted:
PwnallthethingsPwnallthethings
2022-11-20
Mark Lechtik boosted:
Dmitri Alperovitchdmitri@mas.to
2022-11-20

There is far too little recognition of the fact that the US Intelligence Community’s ability to discover Russian invasion plans and share them with Ukraine is one of the greatest intelligence successes of the last 50 years and has had a critical impact on thwarting Putin’s imperialist ambitions.

They knew the Russian war plans better than most of the Russian military executing the invasion (who mostly had no idea they were going to war) and even members of Putin’s Security Council! Remarkable!

2022-11-20

Elon's gesture looks like it has a question mark at the end of it

2022-11-20

This must be the feeling of infinite and all consuming cringe
twitter.com/elonmusk/status/15

Mark Lechtik boosted:
Łukasz :verified:maldr0id@infosec.exchange
2022-11-19

The charla&tan fraud matrix - from attack methods (in red) to defence methods (in blue)

2022-11-18

twitter.com/cpartisans/status/
I don't know much about the credibility of this entity, but if that data is out I think its in the best interest of all of us to know who Roskomnadzor has been targeting since at least February. Who knows what familiar names may come up there.

2022-11-18

@roccobarbi I can't imagine who still uses Myspace, maybe bots. With Elon onboard, Im not surprised even they don't want to use Twitter.

2022-11-18

I have uninstalled the Twitter app from my phone, recommend you do the same. I feel Twitter is about to reunite with MySpace in social media heaven.

2022-11-15

While everyone is mocking Lavrov (rightfully so) for his western outfit and gadgets, I keep thinking how many APTs are lurking in his iPhone.

2022-11-14

@pinkflawd libboost is just as much worse to RE on Windows

2022-11-09

#intoduction
I've been doing malware RE and CTI research for the better part of a decade, with a primary focus on APTs.

A bit of my past work (along with colleagues across different companies) can be found in the public domain. This includes research of the following APT activities:

- MoonBounce (with Vasiliy Berdnikov): securelist.com/moonbounce-the-
- GhostEmperor (with Vasiliy Berdnikov, @r00tbsd, Aseel Kayal)
securelist.com/ghostemperor-fr
- MosaicRegressor:
securelist.com/mosaicregressor
- Operation TunnelSnake (with Giampaolo Dedola):
securelist.com/operation-tunne
- LuminousMoth (with @r00tbsd and Aseel Kayal):
securelist.com/apt-luminousmot
- Lyceum (with @r00tbsd and Aseel Kayal):
securelist.com/lyceum-group-re

I also did some research on DPRK sourced security products:
- SiliVaccine AV (with Michael Kajiloti):
research.checkpoint.com/2018/s
youtube.com/watch?v=7xcLAiWQm9
- The North Korea AV Anthology (with Ariel Jungheit):
drive.google.com/file/d/1lq0Sj

As well as a work with my friend @hasherezade on unusual malware formats:
drive.google.com/file/d/1k758Q

Happy to discuss on anything APT\CTI\RE related.

2022-11-08

@campuscodi yeah I'm definitely way behind in the social media game.

2022-11-08

@campuscodi good to see you here

2022-11-08

@cstromblad Still exploring this neighborhood. Thanks for the warm welcome!

2022-11-08

Verifying myself (to the best of my ability):
twitter.com/_marklech_/status/

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst