Alan Neville's Avatar

Alan Neville

@abnev

Principal Intelligence Analyst @ Symantec. Views are my own etc. https://keybase.io/abnev

229
Followers
1,183
Following
11
Posts
11.11.2024
Joined
Posts Following

Latest posts by Alan Neville @abnev

Preview
Access Now - Paragon must answer for spyware use against civil society and journalists Access Now calls on Paragon to answer for the use of its spyware in Italy against journalists, and to address oversight failures.

Mercenary spyware vendor Paragon claims it's "responsible", (unlike NSO Group)

But our investigations @citizenlab.ca show Paragon's spyware was abused in Italy ๐Ÿ‡ฎ๐Ÿ‡น to target civil society

@accessnow.org sent them a letter with questions, and I signed on ๐Ÿ‘‡

www.accessnow.org/press-releas...

19.06.2025 13:25 ๐Ÿ‘ 11 ๐Ÿ” 7 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 1
Preview
Cyber weapons in the Israel-Iran conflict may hit the US : With Tehranโ€™s military weakened, digital retaliation likely, experts tell The Reg

"Typically the Iranians have deployed wipers against targets in critical infrastructure and other organizations," Google threat intelligence group chief analyst John Hultquist told The Register. "We will probably see more of that in Israel and we could see it in the US as well."

13.06.2025 22:15 ๐Ÿ‘ 3 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 1
Preview
Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump 'It's a high-stakes intelligence war' he told El Reg exclusiveย  A mystery whistleblower calling himself GangExposed has exposed key figures behind the Conti and Trickbot ransomware crews, publishing a trove of internal files and naming names.โ€ฆ

Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump

31.05.2025 10:28 ๐Ÿ‘ 20 ๐Ÿ” 5 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Iranian pleads guilty to launching Baltimore ransomware attack, faces 30 years behind bars Sina Gholinejad admitted to using the Robbinhood ransomware variant to extort ransom payments from dozens of victims.

Itโ€™s amazing to me that it can take 6 years from the first attack until the trial starts.

via @jgreig.bsky.social & @therecordmedia.bsky.social

27.05.2025 22:41 ๐Ÿ‘ 3 ๐Ÿ” 5 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 0
Video thumbnail

NASA simulation for what you'd see while plunging into a black hole:
youtu.be/chhcwk4-esM
There's actually a lot left to see after passing the event horizon!

20.05.2025 04:04 ๐Ÿ‘ 422 ๐Ÿ” 87 ๐Ÿ’ฌ 31 ๐Ÿ“Œ 7
Post image

#ESETresearch has published its latest APT Activity Report, covering October 2024 to March 2025 (Q4 2024โ€“Q1 2025). China-aligned groups like Mustang Panda and DigitalRecyclers continued their espionage campaigns targeting the EU government and maritime sectors. 1/2

19.05.2025 12:30 ๐Ÿ‘ 9 ๐Ÿ” 5 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes The company behind the Signal clone used by at least one Trump administration official was breached earlier this month. The hacker says they got in thanks to a basic misconfiguration.

Here's how the TM SGNL server, which had access to plaintext chat logs from people like Mike Waltz, got hacked in about 20 minutes www.wired.com/story/how-th... (my first article in @wired.com!)

18.05.2025 11:11 ๐Ÿ‘ 150 ๐Ÿ” 54 ๐Ÿ’ฌ 6 ๐Ÿ“Œ 10
Reads Chinese influence operations and disinformation campaigns, Bellingcat Stage Talk Thursday 08/05

Reads Chinese influence operations and disinformation campaigns, Bellingcat Stage Talk Thursday 08/05

Learn about monitoring inauthentic accounts and conducting investigations into Foreign Information Manipulation and Interference (FIMI) in our next Stage Talk on Thursday, 4pm CEST/10am EDT. We're joined by the @doublethinklab.bsky.social team live in our Discord Server
discord.gg/FGq4XfYm?eve...

06.05.2025 16:34 ๐Ÿ‘ 126 ๐Ÿ” 44 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 2

Layoffs at CrowdStrike. Iโ€™m safe, but if youโ€™re looking for IR consultants I know a bunch of fucking amazing ones that will be looking for jobs ๐Ÿซ 

07.05.2025 14:54 ๐Ÿ‘ 34 ๐Ÿ” 24 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 1
Preview
Malicious PyPI Package Targets Discord Developers with Remot... The Socket Research team investigates a malicious Python package disguised as a Discord error logger that executes remote commands and exfiltrates dat...

Socket Security has discovered a malicious Python library that contained a remote access trojan and went undetected for over three years

socket.dev/blog/malicio...

08.05.2025 10:10 ๐Ÿ‘ 10 ๐Ÿ” 4 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Diagram that shows:
- E2EE chat logs between TM SGNL and Signal
- TM SGNL sends data to archive server using HTTPS API
- Archive server sends data to destinations using SMTP, SFTP, or Microsoft 365

Diagram that shows: - E2EE chat logs between TM SGNL and Signal - TM SGNL sends data to archive server using HTTPS API - Archive server sends data to destinations using SMTP, SFTP, or Microsoft 365

I'm analyzing the TM SGNL source code and will publish findings tomorrow. But the for a sneak peak, here's how it seems TeleMessage's system works:

There's E2EE between TM SGNL and Signal, but NOT between TM SGNL and archive destinations. TM's archive server can read the chat logs.

Stay tuned.

05.05.2025 20:32 ๐Ÿ‘ 107 ๐Ÿ” 39 ๐Ÿ’ฌ 8 ๐Ÿ“Œ 10
Ever needed a graceful way to say "no"?

This tiny API returns random, generic, creative, and sometimes hilarious rejection reasons perfectly suited for any scenario: personal, professional, student life, dev life, or just because.

Built for humans, excuses, and humor.

Ever needed a graceful way to say "no"? This tiny API returns random, generic, creative, and sometimes hilarious rejection reasons perfectly suited for any scenario: personal, professional, student life, dev life, or just because. Built for humans, excuses, and humor.

No as a service
โ€ฉDemo naas.isalman.dev/no
Repo github.com/hotheadhacke...

01.05.2025 10:00 ๐Ÿ‘ 271 ๐Ÿ” 66 ๐Ÿ’ฌ 11 ๐Ÿ“Œ 3
Graphic illustrating the MintsLoader attack chain.

Graphic illustrating the MintsLoader attack chain.

Recorded Future Insikt Group researchers analyse MintsLoader, a malicious loader deployed through multiple infection vectors that commonly deploys second-stage payloads such as GhostWeaver, StealC, and a modified BOINC client. www.recordedfuture.com/research/unc...

01.05.2025 10:05 ๐Ÿ‘ 0 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Graphical illustration of the SLAAC attack carried out by Spellbinder

Graphical illustration of the SLAAC attack carried out by Spellbinder

ESET researchers provide an analysis of Spellbinder, a lateral movement tool for performing adversary-in-the-middle attacks, used by TheWizards, a China-aligned threat actor. www.welivesecurity.com/en/eset-rese...

01.05.2025 10:07 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Graph showing KongTuke activities from September 2024 to March 2025

Graph showing KongTuke activities from September 2024 to March 2025

Trustwave researchers observed a notable increase in NodeJS-based backdoor deployments across multiple malware campaigns, including KongTuke, Fake CAPTCHA schemes, Mispadu, and Lumma stealers. www.trustwave.com/en-us/resour...

01.05.2025 10:09 ๐Ÿ‘ 0 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
North Korean operatives have infiltrated hundreds of Fortune 500 companies Security leaders at Mandiant and Google Cloud say nearly every major company has hired or received applications from North Korean nationals working on behalf of the countryโ€™s regime.

Security leaders at Mandiant and Google Cloud say nearly every major company has hired or received applications from North Korean nationals working on behalf of the countryโ€™s regime. via @mattkapko.com cyberscoop.com/north-korea-...

01.05.2025 09:24 ๐Ÿ‘ 3 ๐Ÿ” 4 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 1
CVE-2024-10442 (CVSS 10): Zero-Click RCE in Synology DiskStation, PoC Publishes CVE-2024-10442 allows unauthenticated RCE on Synology DS1823xs+ via Replication Service flaw. Patch now to avoid exploit risk.

CVE-2024-10442 (CVSS 10): Zero-Click RCE in Synology DiskStation, PoC Publishes

01.05.2025 03:39 ๐Ÿ‘ 3 ๐Ÿ” 3 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Windows RDP lets you log in using revoked passwords. Microsoft is OK with that. Researchers say the behavior amounts to a persistent backdoor.

So regarding this behavior: I've confirmed it, and there's more detail than is in the story. Let's go.

arstechnica.com/security/202...

01.05.2025 05:03 ๐Ÿ‘ 9 ๐Ÿ” 5 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 5

Ako ransomware affiliate gets five years in prison

30.04.2025 21:21 ๐Ÿ‘ 7 ๐Ÿ” 3 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks ESET researchers publish an analysis of Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks.

#ESETResearch analyzed the toolset of the China-aligned APT group that we have named #TheWizards. It can move laterally on compromised networks by performing adversary-in-the-middle (AitM) attacks to hijack software updates. www.welivesecurity.com/en/eset-rese... 1/6

30.04.2025 11:30 ๐Ÿ‘ 20 ๐Ÿ” 12 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 0
Preview
Russia attempting cyber sabotage attacks against Dutch critical infrastructure Kremlin-backed hackers have tried sabotage attacks against critical infrastructure in the Netherlands, the country's Military Intelligence and Security Service said in its annual report.

Russia attempting cyber sabotage attacks against Dutch critical infrastructure therecord.media/dutch-mivd-r...

22.04.2025 18:49 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows Since early March 2025, Volexity has observed multiple suspected Russian threat actors conducting highly targeted social engineering operations aimed at gaining access to the Microsoft 365 (M365) acco...

@volexity.com #threatintel: Multiple Russian threat actors are using Signal, WhatsApp & a compromised Ukrainian gov email address to impersonate EU officials. These phishing attacks abuse 1st-party Microsoft Entra apps + OAuth to compromise targets.

www.volexity.com/blog/2025/04...โ€จโ€จ#dfir

22.04.2025 16:39 ๐Ÿ‘ 18 ๐Ÿ” 12 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 1
Post image

Rocky โค๏ธ

17.04.2025 22:26 ๐Ÿ‘ 366 ๐Ÿ” 60 ๐Ÿ’ฌ 6 ๐Ÿ“Œ 7
Preview
CVE-2025-24054, NTLM Exploit in the Wild - Check Point Research Key Points Introduction NTLM (New Technology LAN Manager) is a suite of authentication protocols developed by Microsoft to verify user identities and protect the integrity and confidentiality of netwo...

Check Point published a write-up of CVE-2025-24054, an NTLM leak that Microsoft patched last month.

The company says the vulnerability is now being exploited in the wild, with one campaign targeting government and private institutions in Poland and Romania.

research.checkpoint.com/2025/cve-202...

17.04.2025 09:17 ๐Ÿ‘ 7 ๐Ÿ” 8 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 1
Preview
China swipes at NSA for alleged Asian Winter Games hack : Beijing claims NSA went for gold in offensive cyber, got caught in the act

After years of the West naming and shaming nation-state hackers I have wondered (and written about) the lack of similar finger pointing back at the US etc. This new shift from China to out western hackers for cyber spying is overall a good thing for transparency. www.theregister.com/2025/04/15/c...

17.04.2025 09:24 ๐Ÿ‘ 8 ๐Ÿ” 5 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Around the World in 90 Days: State-Sponsored Actors Try ClickFix | Proofpoint US Key Findings While primarily a technique affiliated with cybercriminal actors, Proofpoint researchers discovered state-sponsored actors in multiple campaigns using the ClickFix social

My first blog with Proofpoint is live! And we love a good crossover. State-sponsored actors try their hand at ClickFix - the hottest thing in cybercrime. Meet the North Koreans, Iranians, and Russians who are upping their social engineering game www.proofpoint.com/us/blog/thre...

17.04.2025 11:12 ๐Ÿ‘ 42 ๐Ÿ” 19 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 4
Preview
NSO lawyer names Mexico, Saudi Arabia, and Uzbekistan as spyware customers behind 2019 WhatsApp hacks | TechCrunch This is the first time representatives for the spyware maker have publicly named its government customers.

NEW: In a hearing last week, an NSO Group lawyer said that Mexico, Saudi Arabia, and Uzbekistan were among the governments responsible for a 2019 hacking campaign against WhatsApp users.

This is the first time representatives of the spyware maker admit who its customers are.

16.04.2025 15:44 ๐Ÿ‘ 41 ๐Ÿ” 22 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 1
Preview
CVE program averts swift end after CISA executes 11-month contract extension After DHS did not renew its funding contract for reasons unspecified, MITREโ€™s 25-year-old Common Vulnerabilities and Exposures (CVE) program was slated for an abrupt shutdown on April 16, which would ...

MITREโ€™s CVE database was hours from disappearing. CISA saved it at the last minute with a contract extension. Hereโ€™s what you need to know.

Read Cynthia Brumfield's @metacurity.com news article:

www.csoonline.com/article/3963...

#InfoSec #ThreatIntel #CVE

16.04.2025 18:26 ๐Ÿ‘ 3 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
CISA extends funding to ensure 'no lapse in critical CVE services' CISA says the U.S. government has extended MITRE's funding to ensure no continuity issues with the critical Common Vulnerabilities and Exposures (CVE) program.

CISA to the rescue www.bleepingcomputer.com/news/securit...

16.04.2025 18:35 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
CVE Foundation FOR IMMEDIATE RELEASE April 16, 2025 CVE Foundation Launched to Secure the Future of the CVE Program [Bremerton, Washington] โ€“ The CVE Foundation has been formally established to ensure the long-term ...

๐Ÿ‘ "Active CVE Board members have spent the past year developing a strategy to transition CVE to a dedicated, non-profit foundation." www.thecvefoundation.org/home

16.04.2025 16:53 ๐Ÿ‘ 8 ๐Ÿ” 6 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0