#MalwareAnalysis

2026-03-13

Enjoiying talk about #DynamoRIO at #bSidesLjubljana, a dynamic instrumenation tool that can be used for #MalwareAnalysis and is very good at passing anti-analysis checks.
This is because it does not virtualize, but works like a just-in-time compiler.
Good thing I took dynamic compilers class at #TUvienna.

2026-03-11

๐ŸŒŸ Welcome to Another #BSidesLuxembourg2026 Highlight!

Training announcement:

Full-Day Malware Training on May 6th our workshop/training day: ๐— ๐—”๐—Ÿ๐—ช๐—”๐—ฅ๐—˜ ๐——๐—˜๐—ฉ๐—˜๐—Ÿ๐—ข๐—ฃ๐— ๐—˜๐—ก๐—ง ๐—™๐—ข๐—ฅ ๐—˜๐—ง๐—›๐—œ๐—–๐—”๐—Ÿ ๐—›๐—”๐—–๐—ž๐—˜๐—ฅ๐—ฆ (๐—ช๐—œ๐—ก๐——๐—ข๐—ช๐—ฆ, ๐—Ÿ๐—œ๐—ก๐—จ๐—ซ, ๐—”๐—ก๐——๐—ฅ๐—ข๐—œ๐——) with Zhassulan Zhussupov aka cocomelonc @cocomelonckz

Price: Included in your BSides 3-days ticket.

Whether youโ€™re on the Red Team or Blue Team, this 8-hour, hands-on training reveals how real-world malware is built and evades defenses across Windows, Linux, and Android. Master injection techniques, persistence, privilege escalation (LSASS dump, UAC bypass), AV/EDR evasion (Antiโ€‘VM, crypto tricks), Linux kernel injection, and Android malware abusing legit APIs โ€“ all via labs and homework exercises.

Led by cocomelonc: Author of Malware Development for Ethical Hackers (Packt), MALWILD, MD MZ, and AIYA Mobile Malware. Malpedia contributor, HVCK writer, cybersecurity lab co-founder, and speaker at Black Hat, DEFCON, Hack.lu, Security BSides, and more.

Requires Python, Kotlin, C/C++; assembly optional.

๐Ÿ“…Conference: 6โ€“8 May 2026 | 09:00โ€“17:00
๐Ÿ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: 2026.bsides.lu/tickets/

Seats limited โ€“ turn malware reports into real skills! ๐Ÿ”ฅ

#BSides #Community #ReverseEngineering #DFIR #MalwareAnalysis

2026-03-07

Last day before prices go up for Deconstructing Rust Binaries at @ringzer0, March 23-26! If you've been thinking about this fully remote, 16-hour Rust reverse engineering training: now is the time to book!

ringzer0.training/countermeasu

#infosec #ReverseEngineering #rustlang #MalwareAnalysis #malware #reversing

2026-03-03

A comprehensive article from #CheckPoint Research

"Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering"

research.checkpoint.com/2025/g

From the article:
"The use of AI doesnโ€™t eliminate the need for human expertise. XLoaderโ€™s most sophisticated protections, such as scattered key derivation logic and multi-layer function encryption, still require manual analysis and targeted adjustments. But the heavy lifting of triage, #deobfuscation, and scripting can now be accelerated dramatically. What once took days can now be compressed into hours."

#ai #aislop #hype #reverse #reverseengineering #reversing #malware #malwareanalysis #mcp

JAVAPROjavapro
2026-03-02

mit ? @martin_fmi erklรคrt, wie Malware-Muster erkennen, externe Systemaufrufe rekonstruieren & versteckte Architekturen sichtbar machen. Selbst bei obfuskiertem Code.

Lesen & auf den Ernstfall vorbereiten: javapro.io/de/ki-gesteuertes-r

2026-02-28

APT37โ€™s Ruby Jumper campaign demonstrates a mature approach to air-gap traversal.

Observed tradecraft includes:
โ€ข LNK-based initial execution
โ€ข Embedded PowerShell payload extraction
โ€ข Ruby interpreter abuse (v3.3.0)
โ€ข Scheduled task persistence (5-minute interval)
โ€ข USB-based covert bidirectional C2
โ€ข Multi-stage backdoor deployment
Toolset: RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, FOOTWINE, BLUELIGHT.

The removable media relay model enables:
โ€“ Command staging offline
โ€“ Data exfiltration without internet access
โ€“ Lateral spread across isolated systems
โ€“ Surveillance via Windows spyware
This reinforces a critical point:
Air-gap controls must extend beyond physical disconnection โ€” including USB governance, device auditing, behavioral monitoring, and strict runtime execution policies.

Are critical infrastructure operators prepared for USB-mediated C2 relays?

Source: bleepingcomputer.com/news/secu

Engage below.

Follow TechNadu for high-signal threat intelligence insights.
Repost to elevate awareness.

#Infosec #APT37 #AirGapSecurity #ThreatModeling #MalwareAnalysis #NationStateThreats #USBExfiltration #SOC #DetectionEngineering #CyberDefense #OperationalSecurity #ThreatHunting #ZeroTrustArchitecture

APT37 hackers use new malware to breach air-gapped networks
2026-02-25

Just a few weeks left until our training, Deconstructing Rust Binaries, at Ringzer0 COUNTERMEASURE Spring 2026!

For any reverse engineer who wants to learn practical Rust reversing tips and real Rust malware analysis techniques: this is the course you've been looking for.

4 hours each day across 4 days of fully remote training, March 23-26. Prices go up March 8, so reserve your spot now!

ringzer0.training/countermeasu

#MalwareAnalysis #Rust #RustLang #ReverseEngineering #Reversing #Infosec

CindสŽ Xiao ๐Ÿ‰cxiao@infosec.exchange
2026-02-21

RE: infosec.exchange/@washi/116109

MY MORTAL ENEMY IS THAT ONE zgRAT YARA RULE IT SHOWS UP FREAKING EVERYWHERE AND IS SO WRONG ASDHFJDSHFHASFHSDJAH

thank you for this Washi! I learned some things about .NET from this post as well!

popping on the #ReverseEngineering #MalwareAnalysis tags too

2026-02-20

A Nigerian national sentenced to 8 years for compromising CPA firms using Warzone RAT.
Attack methodology:
โ€ข Targeted spear-phishing (CEO impersonation)
โ€ข Domain/email spoofing
โ€ข Malicious executable disguised via crypter
โ€ข Dropbox-hosted payload delivery
โ€ข RAT deployment for lateral movement + data exfil
โ€ข Harvesting SSNs + historical tax data
โ€ข Filing 1,000+ fraudulent returns
The indictment describes AV evasion and silent RAT installation once the executable was triggered.

Detection questions:
Would EDR behavioral analysis have flagged unusual outbound traffic?
Were macro restrictions or executable policies enforced?
Was there email authentication enforcement (DMARC, SPF, DKIM)?
Was MFA enforced across admin endpoints?

Source: bleepingcomputer.com/news/secu

Financial services remain high-value PII targets.
Drop your technical perspective below.

Follow @technadu for advanced threat intelligence reporting.

#Infosec #ThreatModeling #RAT #EDR #BlueTeam #RedTeam #MalwareAnalysis #PhishingDefense #CyberForensics #DigitalEvidence #DataExfiltration #SOC

Nigerian man gets eight years in prison for hacking tax firms
2026-02-16

DNS-based staging via ClickFix represents tactical evolution.

Per Microsoft:
โ€ข Cmd.exe โ†’ nslookup execution
โ€ข Hardcoded external DNS resolver
โ€ข Payload embedded in DNS Name: response
โ€ข ZIP retrieval from azwsappdev[.]com
โ€ข Python-based reconnaissance
โ€ข VBScript persistence via Startup LNK
โ€ข ModeloRAT deployment
โ€ข Lumma Stealer distribution via CastleLoader (GrayBravo)

Campaign telemetry also discussed by Bitdefender and Kaspersky.

DNS offers:
โ€ข Reduced dependency on HTTP
โ€ข Traffic blending with legitimate queries
โ€ข Lightweight validation signaling

Detection priorities:
โ€ข Anomalous nslookup patterns
โ€ข External DNS resolver usage
โ€ข Suspicious Startup LNK creation
โ€ข DNS response content inspection

Is your EDR correlating DNS queries with process lineage?
Engage below.
Follow @technadu for advanced threat analysis.

#ThreatIntel #ClickFix #DNSStaging #ModeloRAT #LummaStealer #CastleLoader #DetectionEngineering #BlueTeam #SOC #Infosec #CyberOperations #MalwareAnalysis

Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging
2026-02-15

REMnux 8 รจ la nuova versione della distribuzione Linux dedicata allโ€™analisi di malware, con strumenti aggiornati, container ottimizzati e un ambiente piรน stabile per ricercatori e analisti. #REMnux #MalwareAnalysis #Forensics #CyberSecurity #Linux

linuxeasy.org/remnux-8-la-nuov

2026-02-14
2026-02-14

The CANFAIL campaign demonstrates structured, LLM-assisted phishing operations attributed to a suspected Russian-linked actor.

Per Google Threat Intelligence Group:
โ€ข Sectoral targeting: defense, military, energy, aerospace
โ€ข Regionally tailored email list generation
โ€ข Google Drive-hosted RAR payload delivery
โ€ข Double-extension obfuscation (*.pdf.js)
โ€ข JavaScript loader โ†’ PowerShell execution
โ€ข Memory-only dropper
โ€ข Fake error decoy
โ€ข Links to PhantomCaptcha activity (via SentinelOne)

LLMs were used for reconnaissance, lure generation, and post-compromise operational guidance.

This signals operational AI integration into state-aligned cyber campaigns.

Are detection models prepared for LLM-generated phishing artifacts?

Engage below.
Follow TechNadu for deep technical analysis.

#ThreatIntel #CANFAIL #APTActivity #PhishingDetection #LLMThreats #PowerShellAbuse #UkraineCyber #C2Infrastructure #SOC #BlueTeam #CyberOperations #MalwareAnalysis #Infosec

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
2026-02-14

ClickFix campaigns are now leveraging LLM-generated public artifacts for malware distribution.

Per Moonlock Lab and AdGuard:
โ€ข Abuse of Claude artifact pages
โ€ข Google Ads search poisoning
โ€ข Obfuscated shell execution (base64 decode โ†’ zsh)
โ€ข Second-stage loader for MacSync infostealer
โ€ข Hardcoded API key + token-protected C2
โ€ข AppleScript (osascript) handling data theft
โ€ข Archive staging at /tmp/osalogging.zip
โ€ข Multi-attempt POST exfiltration

Previous campaigns exploited ChatGPT and Grok sharing features.
LLM trust is now an operational risk vector.
Should EDR flag suspicious AI-guided shell patterns?

Source: bleepingcomputer.com/news/secu

Engage below.
Follow @technadu for deep technical threat analysis.

#ThreatIntel #MacOSSecurity #Infostealer #C2Traffic #ClickFix #LLMSecurity #MalwareAnalysis #AppSec #BlueTeam #EDR #ThreatHunting #CyberThreats #ZeroTrust

Claude LLM artifacts abused to push Mac infostealers in ClickFix attack
2026-02-14

The โ€œGraphalgoโ€ campaign represents a modular software supply-chain intrusion targeting developers directly.

Per ReversingLabs findings:
โ€ข 192 malicious npm/PyPI packages
โ€ข Delayed payload activation (post-version change)
โ€ข GitHub repos clean โ€” malicious logic introduced via dependency chain
โ€ข RAT variants in JS, Python, VBS
โ€ข MetaMask wallet targeting
โ€ข Token-protected C2 channels
โ€ข GMT+9 commit indicators

Attribution aligns with historical tradecraft associated with Lazarus Group:
Crypto-focused targeting
Recruitment vector infection
Patience-based staged activation

This is a direct developer-layer attack bypassing enterprise perimeter defenses.

Source: bleepingcomputer.com/news/secu

Are dependency registries the new primary attack surface?
Engage below.

Follow @technadu for advanced threat analysis.

#ThreatIntel #SupplyChainSecurity #MalwareAnalysis #RAT #OpenSourceSecurity #DevSecOps #LazarusGroup #PackageSecurity #AppSec #BlueTeam #CyberThreats #IoC #Infosec

Fake job recruiters hide malware in developer coding challenges
2026-02-14

REMnux v8 represents a structural modernization of a long-standing malware analysis distribution.

Technical highlights:
โ€ข Migration to Ubuntu 24.04 (modern kernel + LTS support)
โ€ข Cast-based installer replacing legacy CLI deployment
โ€ข AI-assisted workflows via MCP server
โ€ข Integration support for Ghidra with AI plugins

Tooling refresh includes:
YARA-X (Rust rewrite for performance improvements)
GoReSym (symbol recovery for Go binaries)
APKiD (Android packer detection)
Manalyze (PE/ELF/MachO static parsing)
This release signals an industry shift toward AI-augmented reverse engineering pipelines.
Is AI-assisted RE the new baseline for threat labs?

Source: cyberpress.org/remnux-v8-relea

Engage below.
Follow @technadu for deep technical cybersecurity updates.

#ThreatResearch #MalwareAnalysis #ReverseEngineering #YARAX #GoBinary #DFIR #Infosec #AIinSecurity #BlueTeam #StaticAnalysis #OpenSourceSecurity #SOC #ThreatHunting

REMnux v8 Released: Enhanced Automation, AI Features, and Modernized Utilities
2026-02-14

Google Threat Intelligence Group assesses the Defense Industrial Base as being under sustained, multi-vector intrusion attempts.

Key clusters:
โ€ข APT44 โ€“ Signal data exfiltration tooling
โ€ข APT45 โ€“ SmallTiger malware
โ€ข Volt Typhoon โ€“ Portal reconnaissance & obfuscation
โ€ข Lazarus Group โ€“ Dream Job social engineering

TTP trends:
- EDR evasion via single-endpoint targeting
- Android malware targeting battlefield apps
- Recruitment workflow compromise
- ORB network reconnaissance
- Manufacturing supply chain exploitation

The DIB threat surface spans personnel, infrastructure, battlefield software, and manufacturing.

Source:
thehackernews.com/2026/02/goog

How are you segmenting defense-critical assets against advanced persistent threats?
Engage below.

Follow @technadu for deep-dive threat analysis.

#APT #ThreatHunting #EDR #DefenseSecurity #CyberEspionage #BlueTeam #ThreatModeling #ZeroTrust #NationalSecurity #InfoSec #MalwareAnalysis #SupplyChainSecurity

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
2026-02-09

๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€/๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด๐˜€ (5/12): "Deconstructing Rust Binaries" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† Cindy Xiao

๐Ÿ“… Dates: May 11, 12 and 13, 2026 (3 days)
๐Ÿ“Š Difficulty: Medium
๐Ÿ–ฅ๏ธ Mode: Hybrid (on-site & remote)

Description:
"๐˜™๐˜ถ๐˜ด๐˜ต-๐˜ฃ๐˜ข๐˜ด๐˜ฆ๐˜ฅ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ช๐˜ด ๐˜ข ๐˜จ๐˜ณ๐˜ฐ๐˜ธ๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต. ๐˜‹๐˜ฆ๐˜ค๐˜ฐ๐˜ฏ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜™๐˜ถ๐˜ด๐˜ต ๐˜‰๐˜ช๐˜ฏ๐˜ข๐˜ณ๐˜ช๐˜ฆ๐˜ด ๐˜ฆ๐˜ฒ๐˜ถ๐˜ช๐˜ฑ๐˜ด ๐˜ณ๐˜ฆ๐˜ท๐˜ฆ๐˜ณ๐˜ด๐˜ฆ ๐˜ฆ๐˜ฏ๐˜จ๐˜ช๐˜ฏ๐˜ฆ๐˜ฆ๐˜ณ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ด๐˜ต๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ฆ๐˜ด๐˜ด๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ข๐˜ญ ๐˜ด๐˜ฌ๐˜ช๐˜ญ๐˜ญ๐˜ด ๐˜ง๐˜ฐ๐˜ณ ๐˜ต๐˜ข๐˜ค๐˜ฌ๐˜ญ๐˜ช๐˜ฏ๐˜จ ๐˜ข ๐˜ฏ๐˜ฆ๐˜ธ ๐˜ค๐˜ฉ๐˜ข๐˜ญ๐˜ญ๐˜ฆ๐˜ฏ๐˜จ๐˜ฆ. ๐˜‹๐˜บ๐˜ฏ๐˜ข๐˜ฎ๐˜ช๐˜ค ๐˜ฃ๐˜ช๐˜ฏ๐˜ข๐˜ณ๐˜ช๐˜ฆ๐˜ด ๐˜ข๐˜ณ๐˜ฆ ๐˜ช๐˜ฏ๐˜ค๐˜ณ๐˜ฆ๐˜ข๐˜ด๐˜ช๐˜ฏ๐˜จ๐˜ญ๐˜บ ๐˜ฎ๐˜ฐ๐˜ท๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ฐ๐˜ธ๐˜ข๐˜ณ๐˜ฅ๐˜ด ๐˜™๐˜ถ๐˜ด๐˜ต, ๐˜บ๐˜ฆ๐˜ต ๐˜ณ๐˜ฆ๐˜ท๐˜ฆ๐˜ณ๐˜ด๐˜ฆ ๐˜ฆ๐˜ฏ๐˜จ๐˜ช๐˜ฏ๐˜ฆ๐˜ฆ๐˜ณ๐˜ด ๐˜ญ๐˜ข๐˜ค๐˜ฌ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ด๐˜ฑ๐˜ฆ๐˜ค๐˜ช๐˜ข๐˜ญ๐˜ช๐˜ป๐˜ฆ๐˜ฅ ๐˜ฌ๐˜ฏ๐˜ฐ๐˜ธ๐˜ญ๐˜ฆ๐˜ฅ๐˜จ๐˜ฆ ๐˜ต๐˜ฐ ๐˜ฅ๐˜ฆ๐˜ค๐˜ฐ๐˜ฅ๐˜ฆ ๐˜ต๐˜ฉ๐˜ฆ๐˜ฎ. ๐˜›๐˜ฉ๐˜ช๐˜ด ๐˜ง๐˜ช๐˜ณ๐˜ด๐˜ต-๐˜ฐ๐˜ง-๐˜ช๐˜ต๐˜ด-๐˜ฌ๐˜ช๐˜ฏ๐˜ฅ ๐˜ค๐˜ฐ๐˜ถ๐˜ณ๐˜ด๐˜ฆ ๐˜ฃ๐˜ณ๐˜ช๐˜ฅ๐˜จ๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ค๐˜ณ๐˜ช๐˜ต๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜จ๐˜ข๐˜ฑ. ๐˜›๐˜ฉ๐˜ณ๐˜ฐ๐˜ถ๐˜จ๐˜ฉ ๐˜ข ๐˜ญ๐˜ข๐˜ฏ๐˜จ๐˜ถ๐˜ข๐˜จ๐˜ฆ-๐˜ค๐˜ฆ๐˜ฏ๐˜ต๐˜ณ๐˜ช๐˜ค ๐˜ข๐˜ฑ๐˜ฑ๐˜ณ๐˜ฐ๐˜ข๐˜ค๐˜ฉ, ๐˜บ๐˜ฐ๐˜ถ'๐˜ญ๐˜ญ ๐˜ญ๐˜ฆ๐˜ข๐˜ณ๐˜ฏ ๐˜™๐˜ถ๐˜ด๐˜ต ๐˜ง๐˜ถ๐˜ฏ๐˜ฅ๐˜ข๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ข๐˜ญ๐˜ด, ๐˜ถ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ฅ ๐˜ฉ๐˜ฐ๐˜ธ ๐˜™๐˜ถ๐˜ด๐˜ต ๐˜ค๐˜ฐ๐˜ฏ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ด ๐˜ต๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ญ๐˜ข๐˜ต๐˜ฆ ๐˜ต๐˜ฐ ๐˜ข๐˜ด๐˜ด๐˜ฆ๐˜ฎ๐˜ฃ๐˜ญ๐˜บ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฎ๐˜ข๐˜ด๐˜ต๐˜ฆ๐˜ณ ๐˜ฑ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜ต๐˜ณ๐˜ช๐˜ข๐˜จ๐˜ฆ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ฒ๐˜ถ๐˜ฆ๐˜ด. ๐˜ ๐˜ฐ๐˜ถ'๐˜ญ๐˜ญ ๐˜ต๐˜ณ๐˜ข๐˜ค๐˜ฆ ๐˜ฅ๐˜ข๐˜ต๐˜ข ๐˜ง๐˜ญ๐˜ฐ๐˜ธ๐˜ด, ๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ง๐˜บ ๐˜ง๐˜ถ๐˜ฏ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ญ๐˜ช๐˜ต๐˜บ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฅ๐˜ฆ๐˜ค๐˜ฐ๐˜ฏ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต ๐˜ณ๐˜ฆ๐˜ข๐˜ญ ๐˜™๐˜ถ๐˜ด๐˜ต ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ด๐˜ข๐˜ฎ๐˜ฑ๐˜ญ๐˜ฆ๐˜ด ๐˜ช๐˜ฏ ๐˜ข ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ถ๐˜ณ๐˜ฆ๐˜ฅ, ๐˜ฆ๐˜ง๐˜ง๐˜ช๐˜ค๐˜ช๐˜ฆ๐˜ฏ๐˜ต ๐˜ธ๐˜ข๐˜บ. ๐˜ž๐˜ฉ๐˜ฆ๐˜ต๐˜ฉ๐˜ฆ๐˜ณ ๐˜บ๐˜ฐ๐˜ถ'๐˜ณ๐˜ฆ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ป๐˜ช๐˜ฏ๐˜จ ๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ฐ๐˜ฎ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ฐ๐˜ณ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ป๐˜ช๐˜ฏ๐˜จ ๐˜ญ๐˜ฆ๐˜จ๐˜ช๐˜ต๐˜ช๐˜ฎ๐˜ข๐˜ต๐˜ฆ ๐˜™๐˜ถ๐˜ด๐˜ต-๐˜ฃ๐˜ข๐˜ด๐˜ฆ๐˜ฅ ๐˜ด๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ๐˜ด, ๐˜บ๐˜ฐ๐˜ถ'๐˜ญ๐˜ญ ๐˜ฅ๐˜ฆ๐˜ท๐˜ฆ๐˜ญ๐˜ฐ๐˜ฑ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ณ๐˜ข๐˜ฅ๐˜ฆ๐˜ค๐˜ณ๐˜ข๐˜ง๐˜ต ๐˜ฏ๐˜ฆ๐˜ฆ๐˜ฅ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ฒ๐˜ถ๐˜ช๐˜ค๐˜ฌ๐˜ญ๐˜บ ๐˜ถ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ฅ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฃ๐˜ณ๐˜ฆ๐˜ข๐˜ฌ ๐˜ฅ๐˜ฐ๐˜ธ๐˜ฏ ๐˜™๐˜ถ๐˜ด๐˜ต ๐˜ฃ๐˜ช๐˜ฏ๐˜ข๐˜ณ๐˜ช๐˜ฆ๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ค๐˜ฐ๐˜ฏ๐˜ง๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ."

About the trainer:
Cindy Xiao is an experienced malware reverse engineer with specialized expertise in analyzing Rust binaries. She brings real-world knowledge of emerging Rust-based threats and combines technical depth with practical, hands-on instruction to help security professionals rapidly upskill in this critical domain.

๐Ÿ”— Training details: nsec.io/training/2026-deconstr

#NorthSec #cybersecurity #infosec #malwareanalysis #reverseengineering

2026-02-09

The new REMnux MCP server connects AI agents to 200+ malware analysis tools. I was surprised at the depth of investigation it can deliver: zeltser.com/ai-malware-analysi

Most of my time on this project went into capturing how I approach malware analysis and making sure the server provides the right guidance at the right time, so that AI can think and adapt as it creates the workflow. The post includes interactive replays of real analysis sessions.

#malware #malwareanalysis #infosec #cybersecurity #tools #artificialintelligence #AI

2026-02-02

A supply chain incident affecting the Open VSX Registry demonstrates how compromised developer credentials can be used to distribute malware through trusted tooling.

Researchers observed malicious updates embedding the GlassWorm loader, using encrypted runtime execution and EtherHiding techniques for C2 retrieval. The incident differs from earlier GlassWorm activity by relying on a legitimate developer account rather than typosquatting.

What defensive signals matter most when static indicators lose value?

Source: thehackernews.com/2026/02/open

Follow TechNadu for measured security analysis.

#InfoSec #SupplyChainSecurity #DeveloperEcosystem #MalwareAnalysis #ThreatIntel #TechNadu

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst