GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Marcus Hutchins :verified: (malwaretech@infosec.exchange)

  1. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Tuesday, 13-May-2025 15:54:18 JST Marcus Hutchins :verified: Marcus Hutchins :verified:
    in reply to
    • Charl van der Walt

    @charlvdwalt the content of the website doesn’t matter because the content is whatever an attacker wants it to be if you aren’t using SSL. Your brochureware is now malware.

    In conversation about 3 days ago from infosec.exchange permalink
  2. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Monday, 12-May-2025 19:32:00 JST Marcus Hutchins :verified: Marcus Hutchins :verified:

    As much as I love the job security, someone is going to have to stop these AI bros before they have us watering the crops with Brawndo.

    In conversation about 3 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/494/287/618/576/384/original/99fe46b2fe5c3613.png

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/494/287/734/645/542/original/ade27f87a960ba4a.png
  3. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Tuesday, 06-May-2025 01:08:33 JST Marcus Hutchins :verified: Marcus Hutchins :verified:

    Soviet Union style planned economy, but make it so that no one involved has any idea what planning or an economy is.

    In conversation about 10 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/456/033/894/437/681/original/4257af6c14ab43ae.png
  4. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Thursday, 17-Apr-2025 08:05:29 JST Marcus Hutchins :verified: Marcus Hutchins :verified:
    in reply to
    • Nullstring 🏴‍☠️

    @0x00string

    Twitter dipshit: "the cybersecurity people have lots of sex and also don't baselessly claim the election is rigged, it's a total travesty"

    Me: "where do I sign up?"

    In conversation about a month ago from infosec.exchange permalink
  5. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Thursday, 17-Apr-2025 05:01:52 JST Marcus Hutchins :verified: Marcus Hutchins :verified:

    This is the kind of high quality cybersecurity content you only get on X dot com. "People support the cybersecurity guy who said the election wasn't rigged because cybersecurity is full of leftists & sexual perversion"

    (Note: Chris Krebs is a lifelong Republican & Trump nominee, not even remotely left-wing).

    In conversation about a month ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/349/243/374/911/712/original/15e8d612c6ad837c.png
  6. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Thursday, 10-Apr-2025 14:36:33 JST Marcus Hutchins :verified: Marcus Hutchins :verified:

    Just woke up to find out the president has revoked the security clearances of everyone at a cybersecurity company because Chris Krebs went to work there. Krebs was his director for the agency in charge of Cybersecurity & Election Security during his first term and refuted his claim the 2020 election was "stolen".

    Revoking the clearance of every employee basically kills the company's ability to do government contracts, which is a major source of revenue for cybersecurity companies. The White House press release also restates the false claim that the 2020 election was "rigged and stolen".

    The US is basically a fascist dictatorship at this point. One where the president goes after entire companies because a single person spoke out against his verifiably false claims. You'd have to be completely insane to travel here right now.

    In conversation about a month ago from infosec.exchange permalink
  7. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Wednesday, 09-Apr-2025 05:26:31 JST Marcus Hutchins :verified: Marcus Hutchins :verified:

    I bought $200 worth of stuff from Costco this week and they bought $0 worth of stuff from me. To resolve this deficit I will be charging myself $50 every time I go to the store. With this extra income I will build toasters, which I will attempt to sell to my local Costco for $200 each.

    In conversation about a month ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/300/978/517/719/702/original/b6a96a1f935d1746.png
  8. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Wednesday, 09-Apr-2025 03:22:50 JST Marcus Hutchins :verified: Marcus Hutchins :verified:

    What Is Fast Flux And Why Is The NSA Calling It A National Security Threat?

    https://www.youtube.com/watch?v=CQ3nnlZ8nbw

    In conversation about a month ago from infosec.exchange permalink
  9. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Saturday, 29-Mar-2025 06:42:01 JST Marcus Hutchins :verified: Marcus Hutchins :verified:
    • Kevin Beaumont

    @GossiTheDog Wait, so he basically saddled all the private equity investors in his startup with the Twitter debt? lmfaooooo

    In conversation about 2 months ago from infosec.exchange permalink
  10. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Tuesday, 11-Mar-2025 17:16:27 JST Marcus Hutchins :verified: Marcus Hutchins :verified:

    DDoS attacks almost always originate from hacked devices. The country/countries that the traffic originates from has never been an indicator of who's behind the attack. Musk's implication that Ukraine was responsible for the Twitter DDoS attack based on seeing some traffic originating from Ukrainian IPs is just dangerous speculation.

    I've mapped botnet professionally for a decade, and all that looking at IP addresses locations tells you is the geographical distribution of compromised devices. When you plot this kind of data of chart, you typically just get a heat map of population density, slightly skewed by economic factors. Nations with larger populations tend to have more devices, but developing nations tend to have a higher percentage of older less secure devices, which are more likely to be hacked and recruited into botnets.

    In conversation about 2 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/142/654/004/992/205/original/7be0e9fcbce4375b.png
  11. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Monday, 17-Feb-2025 00:00:29 JST Marcus Hutchins :verified: Marcus Hutchins :verified:
    • Tarah Wheeler 🖖♦️

    Really great thread on Bluesky by @Tarah about the disparity between economic indicators and voter's actual lived experience.

    https://bsky.app/profile/tarah.org/post/3liaxh3vjyk23

    In conversation about 3 months ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Tarah Wheeler (@tarah.org)
      from Tarah Wheeler (@tarah.org)
      The strongest lesson here is that economic inequality wasn't being effectively measured. Saying "inflation has dropped" is the most meaningless phrase imaginable when a teacher in Indiana who made 39k last year has watched their grocery bill rise 15% in the last year with no raise. 10/n
  12. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Monday, 17-Feb-2025 00:00:28 JST Marcus Hutchins :verified: Marcus Hutchins :verified:
    in reply to
    • Tarah Wheeler 🖖♦️
    • Mark Koek

    @mkoek @Tarah People's feelings. People don't vote based on economic indicators, they vote based on how they feel and what they think will help them.

    In conversation about 3 months ago from infosec.exchange permalink
  13. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Friday, 14-Feb-2025 04:07:52 JST Marcus Hutchins :verified: Marcus Hutchins :verified:

    Interesting statement filed in the case against the Treasury and DOGE which gives us some cybersecurity insights. Here's the key takeaways:

    - Only a single DOGE employee (25 year old engineer Marko Elez) has direct access to the Treasury payment systems.
    - The DOGE employee was only allowed to access the systems from an encrypted government issued laptop.
    - The government issued laptop is equipped with monitoring software, data loss prevention, and tools to block internet access, and use of removable storage devices.
    - Strict instructions were given that no data could leave this laptop for the duration of the engagement.
    - The employee was meant to only have read access to treasury systems, but was accidentally granted write access.
    - Following the accident, the employee's laptop was examined and it was concluded that no data had been written during the mistake.
    - After the employee temporarily resigned over racist Twitter posts, all access was revoked, and all government issued equipment was recovered.
    - The DOGE employee shared updates about his work with another DOGE employee, which "may have occasionally included screenshots of payment systems data or records"

    My take:
    If true, it seems that unlike other instances at different agencies, the Treasury abided by strict security protocols.

    My only real cybersecurity question here are:

    1) They document claims screenshots of payment records were shared with another DOGE employee. It doesn't specify how they were shared. Was it just the authorized employee showing his screen to someone, or were they transmitted outside of the laptop? If it's the latter, then it calls much of the claims made in the article into question.

    2) This statement isn't clear "The Bureau enabled enhanced monitoring on his laptop, which included the ability to monitor and block website access, block the use of external peripherals (such as USB drives or mass storage devices), monitor any scripts or commands executed on the device, and block access to cloud-based storage services."

    The use of the phrase "included the ability to" isn't really clear on if those security controls were actually being enforced. The phrasing could simply mean they enabled software that had those capabilities, but they weren't being used.

    Now, cybersecurity aside, the bigger question is what was the purpose of any of this? To audit something as complex as a treasury payment systems, you'd need teams of forensic accountants.

    A single 25 year old software engineer with no prior treasury experience poking around some files on a laptop is not an audit. The entire DOGE operation seems like a charade. The organization consists almost entirely of young engineers pulled from Musk's other companies, has produced no plan for how they intend to audit any of these systems, and lacks any oversight at all.

    https://www.documentcloud.org/documents/25521978-gov/

    In conversation about 3 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/998/084/512/015/506/original/81bb52baef818701.png
  14. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Wednesday, 12-Feb-2025 19:10:15 JST Marcus Hutchins :verified: Marcus Hutchins :verified:

    Lol, Florian is big mad because I called him out for defending a Nazi salute and spreading AfD (German Neo-Nazi party) propaganda.

    It's true though, I do dislike him for other reason. I've disliked him ever since 2020 when I had to unfollow him for posting MAGA nonsense. I then disliked him even more when he decided not to respect my decision to leave Twitter and kept reposting my posts there without my permission while simultaneously mocking my choice to leave, and now that he's gone full blown mask-off neo-Nazi, I dislike him close to the maximum amount I can dislike a person.

    In conversation about 3 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/990/058/886/676/180/original/d638466668312fea.png
  15. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Wednesday, 12-Feb-2025 19:10:14 JST Marcus Hutchins :verified: Marcus Hutchins :verified:
    in reply to

    When someone is comfortable with making posts supporting the AfD, defending a Nazi salute, and mocking trans people & DEI from their professional account under their real name, you can only wonder what they do in private. I'm certainly not comfortable sharing a space with someone like that, and I'm sure many others aren't either.

    In conversation about 3 months ago from infosec.exchange permalink
  16. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Sunday, 09-Feb-2025 20:49:09 JST Marcus Hutchins :verified: Marcus Hutchins :verified:
    • BrianKrebs

    Oh man, I have so many stories about the "startup" (Path Network), which the 19-year-old DOGE employee, Edward Coristine previously worked for.
    https://www.wired.com/story/edward-coristine-tesla-sexy-path-networks-doge/

    My first interaction with the founder, Marshal Webb, was in 2016 when the company was called "BackConnect'. I'd recently posted a research paper on the Mirai botnet, which lead to him harassing me online, simply because he considered himself to be the sole authority on Mirai.

    It later turned out, that a lot of his knowledge came from the fact that he was personally hosting the threat actors' infrastructure, therefore had direct insight into the botnet. He tried to play it off as an "intelligence gathering operation". Everyone knew he was really just in bed with the threat actors, but nobody could prove it enough to make a case against him.

    At some point shortly after, a DDoS-for-hire service got hacked and its entire customer database along with all DDoS attack logs was leaked online. One of the records traced back to an employee of his DDoS mitigation firm, and from a combination of attack logs and corroboration with customers, it was determined that they had been launching DDoS attacks against businesses, then cold calling them to sell DDoS protection services.

    It was fairly apparent from the fact the emails coincided with the DDoS attacks, but did not originate from the the employee performing the attacks that the company was in on it, and this wasn't the work of some rogue employee. Nevertheless, said employee got thrown under the bus, convicted, and was unsuccessful in proving that his employer was in on the conspiracy, although they most certainly were.

    Eventually, the founder ended up being named in some kind of criminal complaint or other FBI related court document. The specific wording seemed to imply that he'd gotten caught doing something illegal enough that he'd become an informant to save himself. Amusingly, when the document surfaced, the company just issued a press release about how they were "helping the FBI stop crime" and nothing become of it.

    The company has always been shady as hell, and while it's not abnormal for cybersecurity firms to hire reformed hackers, I've not seen a single employee who was not directly involved in cybercrime immediately prior to getting hired. Furthermore, multiple of the employees have been caught committing cybercrime while working for the company.

    Originally, when I posted this thread on February 6th, I stopped short of any allegation that Edward himself was involved in cybercrime. Since then @briankrebs was able to trace his aliases back to a known cybercrime organization and confirm he indeed was directly involved in cybercrime as recently as May 2024.

    You can find Brian's Mastodon thread on the matter here:
    https://infosec.exchange/@briankrebs/113965646509637016
    https://infosec.exchange/@briankrebs/113957683483583881

    In conversation about 3 months ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      services.it is available for purchase - Sedo.com
    2. Domain not in remote thumbnail source whitelist: him.at
      Martin Hieslmair – him.at

    3. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/972/460/071/311/426/original/ac0158c98b850633.png

    4. No result found on File_thumbnail lookup.
      Mirai
    5. Domain not in remote thumbnail source whitelist: media.infosec.exchange
      BrianKrebs (@briankrebs@infosec.exchange)
      from BrianKrebs
      Attached: 1 image So I finally turned a recent popular post here into a proper story. Teen on Musk’s DOGE Team Graduated from ‘The Com’ Wired reported this week that a 19-year-old working for Elon Musk‘s so-called Department of Government Efficiency (DOGE) was given access to sensitive US government systems even though his past association with cybercrime communities should have precluded him from gaining the necessary security clearances to do so. As today’s story explores, the DOGE teen is a former denizen of ‘The Com,’ an archipelago of Discord and Telegram chat channels that function as a kind of distributed cybercriminal social network for facilitating instant collaboration. https://krebsonsecurity.com/2025/02/teen-on-musks-doge-team-graduated-from-the-com/
    6. Domain not in remote thumbnail source whitelist: media.infosec.exchange
      BrianKrebs (@briankrebs@infosec.exchange)
      from BrianKrebs
      Attached: 1 image Drop what you are doing and read this incredible story from Wired, if you can. After that, come back here. https://www.wired.com/story/edward-coristine-tesla-sexy-path-networks-doge/ It mentions that a 19 y/o man who's assisting Musk's team and who has access to sensitive government systems is Edward Coristine. Wired said Coristine, who apparently goes by the nickname "Big Balls," runs a number of companies, including one called Tesla.Sexy LLC "Tesla.Sexy controls dozens of web domains, including at least two Russian-registered domains. One of those domains, which is still active, offers a service called Helfie, which is an AI bot for Discord servers targeting the Russian market.While the operation of a Russian website would not violate US sanctions preventing Americans doing business with Russian companies, it could potentially be a factor in a security clearance review." The really interesting part for me is Coristine's work history at a company called Path Networks, which Wired describes generously as a company "known for hiring reformed black-hat hackers." "At Path Network, Coristine worked as a systems engineer from April to June of 2022, according to his now-deleted LinkedIn resume. Path has at times listed as employees Eric Taylor, also known as Cosmo the God, a well-known former cybercriminal and member of the hacker group UGNazis, as well as Matthew Flannery, an Australian convicted hacker whom police allege was a member of the hacker group LulzSec. It’s unclear whether Coristine worked at Path concurrently with those hackers, and WIRED found no evidence that either Coristine or other Path employees engaged in illegal activity while at the company." The founder of Path is a young man named Marshal Webb. I wrote about Webb back in 2016, in a story about a DDoS defense company he co-founded called BackConnect LLC. Working with Doug Madory, we determined that BackConnect had a long history of hijacking Internet address space that it didn't own. https://krebsonsecurity.com/2016/09/ddos-mitigation-firm-has-history-of-hijacks/ Incidentally, less than 24 hours after that story ran, my site KrebsOnSecurity.com was hit with the biggest DDoS attack the Internet had ever seen at the time. That sustained attack kept my site offline for nearly 4 days. https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/ Here's the real story behind why Coristine only worked at Path for a few months. He was fired after Webb accused him of making it known that one of Path's employees was Curtis Gervais, a serial swatter from Canada who was convicted of perpetrating dozens of swattings and bomb threats -- including at least two attempts on our home in 2014. [BTW the aforementioned Eric Taylor was convicted of a separate (successful) swatting against our home in 2013. https://krebsonsecurity.com/2017/09/canadian-man-gets-9-months-detention-for-serial-swattings-bomb-threats/ https://krebsonsecurity.com/2017/02/men-who-sent-swat-team-heroin-to-my-home-sentenced/ In the screenshot here, we can see Webb replying to a message from Gervais stating that "Edward has been terminated for leaking internal information to the competitors." Wired cited experts saying it's unlikely Coristine could have passed a security clearance needed to view the sensitive government information he now has access to. Want to learn more about Path? Check out the website https://pathtruths.com/
  17. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Sunday, 26-Jan-2025 01:52:36 JST Marcus Hutchins :verified: Marcus Hutchins :verified:

    The entire tech industry right now

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments


  18. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Friday, 24-Jan-2025 21:01:17 JST Marcus Hutchins :verified: Marcus Hutchins :verified:

    I went back to the Nerd Reich website to see who in infosec was defending the Nazi salute, and wasn't super surprised to see Florian Roth. He's spent the last few months posting pro-AfD (German Neo-Nazi party) propaganda and interacting with AfD accounts in his replies. Just a heads up for those of you who work with him.

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/882/933/230/089/903/original/9ff8cb89692f1cea.png

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/882/933/478/437/157/original/e7c434d7e6e030ab.png

    3. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/882/933/948/039/072/original/2af9ed5bce41f452.png

    4. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/882/949/223/907/168/original/7958046eef66eab3.png
  19. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Sunday, 19-Jan-2025 02:28:53 JST Marcus Hutchins :verified: Marcus Hutchins :verified:

    I don’t think I’ve ever seen a more perfect reading of Biden’s statement where he waited until the last day of his presidency to tell everyone that they live in an oligarchy

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/847/894/104/790/556/original/56af49248054ae6a.png
  20. Embed this notice
    Marcus Hutchins :verified: (malwaretech@infosec.exchange)'s status on Wednesday, 18-Dec-2024 02:52:05 JST Marcus Hutchins :verified: Marcus Hutchins :verified:

    None of this feels like the result of any technical limitations. I'm pretty sure they're just trying to maximize their engagement metrics at the expense of Mastodon. IMO Threads should be defederate until they "figure out" how to implement actual federation.

    In conversation about 5 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/665/036/041/846/415/original/d2e1f4d014d5a326.png
  • Before

User actions

    Marcus Hutchins :verified:

    Marcus Hutchins :verified:

    Cybersecurity

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          23829
          Member since
          11 Nov 2022
          Notices
          169
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.