John Fitzpatrick

Work and hobbies are #cybersecurity. I specialise in #HPC / #supercomputer security. I run HPCsec and am busy bringing TCDO to the world through Lab538. I spend a lot of free time scouring the internet for things of interest, building interesting datasets and track quite a lot of #ransomware and e-crime groups. Formerly JUMPSEC and MWR/MWRLabs.

John Fitzpatrick boosted:
Electromagnetic Fieldemf@emfcamp.org
2024-05-17

The EMF Arcade calls for aid! Do you know someone with a laser cutter (that can do 6mm plywood) who might want to help build an amazing arcade for indie and small game devs? We urgently need help getting our arcade cabinets cut, more details at https://blog.emfcamp.org/2024/05/17/help-the-EMF-arcade/

John Fitzpatrickj0hn_f@infosec.exchange
2024-05-07

@emf looks epic!
What do the "!" and the little people squares mean though?

John Fitzpatrick boosted:
Electromagnetic Fieldemf@emfcamp.org
2024-05-05

There are still tickets available in this sale! If you know someone who wants an EMF ticket:

https://www.emfcamp.org/tickets

John Fitzpatrick boosted:
Electromagnetic Fieldemf@emfcamp.org
2024-03-20

If you're planning on travelling to EMF by train, beware that the line to Ledbury station is closed on the Sunday (June 2nd) until 16:00. There are only a few trains after that and none run direct to London.

There are rail replacement buses, but we are planning on re-routing our shuttle buses to Worcestershire Parkway station instead. We recommend you leave on Monday if possible.

Our travel page will be kept up to date with the latest travel info:
https://www.emfcamp.org/about/travel

John Fitzpatrickj0hn_f@infosec.exchange
2023-11-20

Looks like the British Library ransomware incident was Rhysida #ransomware

Rhysida leak site showing British Library as a victim with a leak time of 6 days
John Fitzpatrickj0hn_f@infosec.exchange
2023-11-13

Have we heard any more on the 0day Lockbit claimed to have used on Boeing? #ransomware #lockbit

John Fitzpatrick boosted:
2023-10-12

Almost 70% of Citrix Netscalers have webshell backdoors installed now, even after patching.

Pretty major backdoor due to Netscaler = internet facing by design, allows remote access, has AD credentials by design. blog.fox-it.com/2023/08/15/app

John Fitzpatrickj0hn_f@infosec.exchange
2023-10-11

I'm still chasing some info on Ryhsida Linux/ESXi ransomware locker.

They're definitely encrypting ESXi environments, but I have not found a single sample in the wild. Does anyone have any insight or a sample they can share?

#Ryhsida #Ransomware #ESXi #Linux

John Fitzpatrickj0hn_f@infosec.exchange
2023-10-03
John Fitzpatrickj0hn_f@infosec.exchange
2023-09-29

I'd been wanting to do this for a while, cudos to unit42 for doing so, a great writeup. Tracking Cl0p's torrents and seeders:
unit42.paloaltonetworks.com/cl

#cl0p #ransomware

John Fitzpatrickj0hn_f@infosec.exchange
2023-09-13

Does anyone have a Rhysida Linux/ESXi sample they can share?

#Ransomware #Rhysida

John Fitzpatrickj0hn_f@infosec.exchange
2023-09-08

@PogoWasRight what a great site! I'd not come across it before but I can see this becoming a daily read for me

And yes I agree, it makes a ton of sense for the TA to take whatever they can in such cases

John Fitzpatrickj0hn_f@infosec.exchange
2023-09-08

@PogoWasRight delete data = pretty regularly.

I'm not sure I've seen an instance where the victim has requested just a portion deleted, it's usually everything, but for victims who are recovering from backups requesting the data deleted but no decryption key is quite common and typically comes with a reasonable discount.

A lot of ransomware actors even have an "evidence of deletionn" process. They will typically even handle deletion requests after they have published the data.

John Fitzpatrickj0hn_f@infosec.exchange
2023-09-06

Microsoft released the findings of their investigation into how Storm-0558 managed to get hold of a signing key that have then access to customers email. Two points that jump out:

1) Turns out even Microsoft can't afford the ingestion fees for Sentinel! 😜

2) Let's also gloss over the fact the corporate network appears to be compromised 🙄

Those two points aside hats off to them for this investigation, can't deny that's impressive work.
msrc.microsoft.com/blog/2023/0

#Microsoft #Storm0558

John Fitzpatrick boosted:
David Buchananretr0id@retr0.id
2023-08-24
This is the most absurd proposed UK legislation I've seen yet https://9to5mac.com/2023/08/24/apple-security-updates-ban/

"Under the latest plans, tech companies would need to notify the British government before rolling out a security fix but might be refused permission if it blocks a vulnerability that’s being exploited by security services…"

Utterly ridiculous.

Edit: I think the quote might be incorrect/misleading, but I'm not an expert on interpreting legislation so I can't really say for sure :/
John Fitzpatrick boosted:
nixCraft 🐧nixCraft
2023-08-20

The reason why Windows ranks #1 on my blog is because it mainly focuses on IT and programming. If my blog was about lifestyle topics like yoga or clothing, I would expect to see more Apple iOS/macOS users in the top spot.

John Fitzpatrick boosted:
Patrick C Miller :donor:patrickcmiller@infosec.exchange
2023-08-18

CISA Releases Cyber Defense Plan to Reduce RMM Software Risks securityweek.com/cisa-releases

John Fitzpatrick boosted:
2023-08-15

Mandiant has released a scanner to check if a Citrix NetScaler Application Delivery Controller (ADC) or NetScaler Gateway Appliance was compromised in widespread attacks exploiting the CVE-2023-3519 vulnerability. 

bleepingcomputer.com/news/secu

John Fitzpatrick boosted:
2023-08-15

Victim of its own #ransomware success: LockBit's got problems, says ransomware hunter Jon DiMaggio
databreachtoday.com/victim-its

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst