Andrea Palmieri🤌

#threatanalysis #androidsecurity eternal newbie / Italian 🍕 / AS Roma 💛❤️

Andrea Palmieri🤌andpalmier@infosec.exchange
2025-02-09

I’ve just pushed an update to my Search Engines AD Scanner (seads)! Feel free to try it out here:

www.github.com/andpalmier/seads

Feedback is always appreciated! :)

Andrea Palmieri🤌andpalmier@infosec.exchange
2024-11-17

END OF THE THREAD!

Check out the original blog post here:
andpalmier.com/posts/jailbreak

If that made you curious about AI Hacking, be sure to check out these CTF challenges by @dreadnode at crucible.dreadnode.io

Andrea Palmieri🤌andpalmier@infosec.exchange
2024-11-17

🤖 LLMs vs LLMs

It shouldn't really come as a big surprise that some methods for attacking LLMs are using LLMs.

Here are two examples:
- PAIR: an approach using an attacker LLM
- IRIS: inducing an LLM to self-jailbreak

⬇️

PAIR promptIRIS prompt
Andrea Palmieri🤌andpalmier@infosec.exchange
2024-11-17

📝 Prompt rewriting: adding a layer of linguistic complexity!

This class of attacks uses encryption, translation, ascii art and even word puzzles to bypass the LLMs' safety checks.

⬇️

cipherchat promptmultilanguage promptascii art promptDRA prompt
Andrea Palmieri🤌andpalmier@infosec.exchange
2024-11-17

💉 Prompt injection: embed malicious instructions in the prompt.

According to OWASP, prompt injection is the most critical security risk for LLM applications.

They break down this class of attacks in 2 categories: direct and indirect. Here is a summary of indirect attacks:

⬇️

Indirect prompt injection schema
Andrea Palmieri🤌andpalmier@infosec.exchange
2024-11-17

😈 Role-playing: attackers ask the LLM to act as a specific persona or as part of a scenario.

A common example is the (in?)famous DAN (Do Anything Now):

This attacks are probably the most common in the real-word, as they often don't require a lot of sophistication.

⬇️

DAN prompt
Andrea Palmieri🤌andpalmier@infosec.exchange
2024-11-17

We interact (and therefore attack) LLMs mainly using language, therefore let's start from there.

I used this dataset github.com/verazuo/jailbreak_l of jailbreak #prompts to create this wordcloud.

I believe it gives a sense of "what works" in these attacks!

⬇️

wordcloud of jailbreaking prompts
Andrea Palmieri🤌andpalmier@infosec.exchange
2024-11-17

Before we dive in: I’m *not* an AI expert! I did my best to understand the details and summarize the techniques, but I’m human. If I’ve gotten anything wrong, just let me know! :)

⬇️

Andrea Palmieri🤌andpalmier@infosec.exchange
2024-11-17

🆕 New blog: "The subtle art of #jailbreaking LLMs"

It contains "swiss cheese", "pig lating" and "ascii art"!

andpalmier.com/posts/jailbreak

It's a summary of some interesting techniques researchers used (and currently use) to attack #LLM

Let's see some examples here🧵⬇️

Andrea Palmieri🤌andpalmier@infosec.exchange
2024-06-18

Just released a new version of seads (Search Engine ADs Scanner), with 2 major new features:

📱 custom user agent string for clicking on ads
⛓️ track URLs through redirects to detect and log chains

GitHub repo: github.com/andpalmier/seads

Andrea Palmieri🤌andpalmier@infosec.exchange
2024-03-13

🚀 Introducing seads: Search Engine ADs Scanner

🕵️‍♂️Automatically detect ads on search engines to identify potential #phishing or #malware threats.

blog: andpalmier.com/posts/seads

GitHub: github.com/andpalmier/seads

Features:
📧 Automate reporting via email, Slack or Telegram
🔄 Concurrent search
📸 Capture ad evidence with screenshot support
🐳 Seamlessly deploy with Docker

If you have questions or comments, feel free to reach out! ✌️

Andrea Palmieri🤌andpalmier@infosec.exchange
2024-02-13

🚀 Just released a new version of apkingo, an APK analysis tool written in GoLang
🔍It can extract package details, permissions, certificate data, and more. It also allows the extraction of information from Play Store,
Koodous, and Virustotal.

github.com/andpalmier/apkingo

🌟 New features include:

- Run in a docker container
- Export analysis results in JSON format
- Extract Android certificate details like country, organization, and more!
- Enhanced integration with VT & Koodous

Andrea Palmieri🤌 boosted:
2024-02-08

Fortinet SSL VPN pre-auth RCE, exploitation in wild. Patch now. CVE-2024-21762

fortiguard.fortinet.com/psirt/

I understand this is very easy to exploit, and applies to unsupported versions too.

#threatintel

Andrea Palmieri🤌 boosted:
Casey Newtoncaseynewton
2023-02-15

Elon Musk ordered major changes to the Twitter ranking algorithm this weekend after ... President Biden's tweet about the Eagles got higher engagement than his did.

Inside the secret system that's showing you all his tweets first, from @zoeschiffer and me. platformer.news/p/yes-elon-mus

At 2:36 on Monday morning, James Musk sent an urgent message to Twitter engineers. 

“We are debugging an issue with engagement across the platform,” wrote Musk, a cousin of the Twitter CEO, tagging “@here” in Slack to ensure that anyone online would see it. “Any people who can make dashboards and write software please can you help solve this problem. This is high urgency. If you are willing to help out please thumbs up this post.”

When bleary-eyed engineers began to log on to their laptops, the nature of the emergency became clear: Elon Musk’s tweet about the Super Bowl got less engagement than President Joe Biden’s.
Andrea Palmieri🤌andpalmier@infosec.exchange
2023-01-19

ThreatFabric has identified a new #Android Banker malware variant, named #Hook.

Hook seems to be a fork of ERMAC, with additional features such as RAT capabilities.

threatfabric.com/blogs/hook-a-

Andrea Palmieri🤌andpalmier@infosec.exchange
2023-01-11

🆕 Just published a new blog post on an #Android #stalkerware analysis:

andpalmier.com/posts/stalkerwa

Andrea Palmieri🤌 boosted:
Lukasz OlejnikLukaszOlejnik
2023-01-09

Security/cryptography analysis of Threema end-to-end instant messenger. Interesting insight for anybody designing modern security infrastructure. "Using modern, secure libraries for cryptographic primitives does not on its own lead to a secure protocol design" breakingthe3ma.app/files/Three

Andrea Palmieri🤌 boosted:
2022-12-21

The Guardian has now confirmed that it has suffered what appears to be a ransomware attack. :(

theguardian.com/media/2022/dec

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst