Phil Stokes

macOS security researcher, technical writer, editor, #lufc fan. Opinions my own. I do not speak for my employer, or they for me. 😎

2025-03-26

s1.ai/readup
🐚 Adware loaders are always the most complex! Props to @syrion89.bsky.social for helping me pull apart all these different bins and figuring out what they had in common and how to attribute and detect them. 🦾 #adware #malware #macOS #security
@sentinelone.com @sentinellabs.bsky.social

ReaderUpdate Reforged | Melting Pot of macOS Malware Adds Go to Crystal, Nim and Rust Variants
2025-02-03

macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed #macOS #malware #DPRK #apt
s1.ai/Ferret

macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed
Phil Stokes boosted:
2025-01-29

If you're interested in leveraging AI and open source tools (radare2) to reverse engineering (mobile) apps, check out this excellent article by @pancake from @NowSecure . Abstract and repo/blog links ⬇️

➡️ Abstract: This post covers a novel approach for recovering application source code, leveraging AI language models to transform pseudo-disassembly into high-level source code. This method is able to handle complex abstractions introduced in high-level languages SwiftUI or Dart and generates output in popular programming languages like Swift, C#, Kotlin, Java, Python or even Bash.

➡️ Repo: github.com/radareorg/r2ai/blob

➡️ Blog: nowsecure.com/blog/2025/01/29/

#radare2

Phil Stokes boosted:
pancake :radare2:pancake@infosec.exchange
2025-01-29
2024-11-15

BlueSky. I think they did it. You can find me over there from now on. bsky.app/profile/philofishal.b

Phil Stokes boosted:
pancake :radare2:pancake@infosec.exchange
2024-10-03

You can download the slides of my #radare2 training at #nn2024 radare.org/get/r2learn-nn2024.

For those who asked for the cheatsheets: github.com/radareorg/radare2-c

2024-09-19

#XProtect v5274 has dropped. Interestingly, the only changes are name changes. The rules remain the same but 3 previously obscured hex named rules for #Bundlore #adware are now given more meaningful names. 👏 #apple #malware #security
Image

Phil Stokes boosted:
:radare2: radare :verified:radareorg@infosec.exchange
2024-08-08

Here's a summary of the most relevant improvements and new features from the radare2 5.9.4 changelog:

* New architectures: STM8, UXN
* Ship support for UF2 firmware images
* Debug s390x natively and better rv64 for Linux/OpenBSD support
* Add switch table analysis for MIPS
* Improved cfg analysis for SPARCv9
* Support latest iOS dyldcache
* Better local variable analysis for arm64
* Faster, more configurable and better analysis
* Improved support for Swift, Unity and Flutter apps
* ELF hash and base32 encoding support
* Several optimisations and big endian support
* More consistent i subcommands
* Smile operator colorizing sources ~:)
* Updated r2papi with r2pipe2 and r2frida goodies
* Better visual and panels interactions and ascii-art
* Rewritten multiline text editor

Phil Stokes boosted:
2024-08-06

Elon is going all in on supporting violent racist thugs bbc.com/news/articles/c5ydddy3

Phil Stokes boosted:
Jeff Johnsonlapcatsoftware
2024-08-06

Updates to runtime protection in macOS Sequoia:

“In macOS Sequoia, users will no longer be able to Control-click to override Gatekeeper when opening software that isn’t signed correctly or notarized. They’ll need to visit System Settings > Privacy & Security to review security information for software before allowing it to run.”

developer.apple.com/news/?id=s

Phil Stokes boosted:
Gui Rambo_inside
2024-08-05

iOS developers: there's one more place to clean up if you're running Xcode 16: "/System/Library/AssetsV2/com_apple_MobileAsset_iOSSimulatorRuntime”
Although it's in /System, it's actually a separate mount point so it is read/write. You can delete older runtime folders in there that you're no longer using. This saved ~30GB on my Mac

Phil Stokes boosted:
:radare2: radare :verified:radareorg@infosec.exchange
2024-08-03

Opening the CFP from the brand new #r2con2024 website radare.org/con/2024

Phil Stokes boosted:
2024-07-18

SentinelOne's Antonio Cocomazzi (@splinter_code) presents his analysis of the updated version of AvNeutralizer (aka AuKill), a tool used by multiple ransomware groups and developed by FIN7 to tamper with security solutions. sentinelone.com/labs/fin7-rebo

Phil Stokes boosted:
2024-07-17

SentinelOne's Jim Walter writes about a new ransomware group, NullBulge, targeting AI and gaming entities. NullBulge targets the software supply chain by weaponizing code in publicly available repositories on GitHub and Hugging Face. sentinelone.com/labs/nullbulge

Phil Stokes boosted:
pancake :radare2:pancake@infosec.exchange
2024-07-17

I fixed some long-standing anoying bugs in the visual mode of #radare2 today, there are some more design decisions I need to address still but it feels way better now. A short summary:

- shift-tab works again
- space key toggle hex modes in the hexdump view (instead of showing the graph)
- multiline comments change the user prompt
- $alias command fixes and tests

Phil Stokes boosted:
2024-07-03

SentinelLabs' Alex Delamotte identified four new CapraRAT APKs associated with suspected Pakistan state-aligned actor Transparent Tribe. sentinelone.com/labs/capratube

Phil Stokes boosted:
2024-05-03

SentinelOne's Phil Stokes (@philofishal) looks at recent macOS Adload Go variants that function as initial droppers for the next stage payload. sentinelone.com/blog/macos-adl

2024-05-02

@pancake what were you thoughts at the time about how/if its release would impact r2’s development and community, and did they turn out true today?

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst