BarryV Profile Banner
BarryV Profile
BarryV

@BarryV

Followers
981
Following
7K
Media
197
Statuses
3K

Show me, don't tell me -- Opinions are my own and do not represent those of my employer

New York, NY
Joined November 2008
Don't wanna be here? Send us removal request.
@MrDanPerez
Dan Perez
1 year
Don’t forget you @virustotal collection with #APT45 iocs is available here
0
4
14
@BarryV
BarryV
3 years
Member Turla signing Javascript malware? Serial Number: cd:fb:13:a3:e6:49:ec:c5:df:95:db:88:ca:c1:3f:fb
0
2
14
@MrDanPerez
Dan Perez
2 years
One really cool thing we've implemented in this iteration of our graduation process is leveraging @virustotal's Collections to provide IOCS to the community for #APT44 - check those out here: https://t.co/dGyXd8QWh0
1
8
23
@paigehacks
Paige Godvin
2 years
First blog post in the books!
Tweet card summary image
cloud.google.com
2
30
112
@DanWBlack
Dan Black
3 years
Today, Mandiant is sharing research on the GRU’s Disruptive Playbook, drawn from insights into GRU’s full-spectrum cyber operations in Ukraine over the past year. https://t.co/ym9Oeb4tmj
Tweet card summary image
cloud.google.com
We have tracked GRU disruptive operations against Ukraine adhering to a standard five-phase playbook.
3
102
245
@rubrikInc
Rubrik
3 years
Head of Rubrik Zero Labs @stonepwn3000 recently talked to @joetidy of @BBCNews about why it is so rare to hear about Western #CyberAttacks and hacking teams and how the narrative of who the good guys and bad guys are in cyber-space is changing 👇
Tweet card summary image
bbc.com
Could a cyber-attack on a Russian technology company provide a rare insight into a Western hack?
2
18
76
@billyleonard
billy leonard
3 years
Really excited to see the culmination of some amazing work from some amazing people get released today. A report from @Google TAG, with contributions from friends at @Mandiant, on cyber activity related to the war in Ukraine. @t_gidwani @ShaneHuntley https://t.co/hsY2xUg9CX
Tweet card summary image
blog.google
One year after the Russian invasion of Ukraine, we’re sharing insights into changes in the cyber threat landscape triggered by the war.
2
26
92
@m_r_tz
Moritz
3 years
capa v5.0.0 is out: major improvements for .NET binary analysis, 150 new/updated rules, caching to improve performance standalone and in the IDA Pro plugin, better ELF OS detection, and a lot more. https://t.co/lzWP1SEZcB VirusTotal integration updates are next!
Tweet card summary image
github.com
This capa version comes with major improvements and additions to better handle .NET binaries. To showcase this we've updated and added over 30 .NET rules. Additionally, capa now caches its rule...
1
59
169
@likethecoins
Katie Nickels
3 years
If you have any intel analysis or threat hunting roles, please reach out to @PhreakingGeek. You'd be hard-pressed to find anyone more passionate about chasing adversaries than he is. I am broken-hearted to have lost him, but I know he'll make a great impact on a new team.
3
8
34
@virustotal
VirusTotal
3 years
We welcome @Mandiant's CAPA and GoReSym to our malware analysis suite. CAPA provides valuable TTPs, and GoReSym produces all kind of metadata to analyse GO samples: https://t.co/3jYUfIf1Zv
1
76
245
@greglesnewich
Greg Lesnewich
3 years
#100DaysofYARA tons of tasty info can be pulled from Macho headers, especially Load commands! Lets get a generic count of LOAD_DYLIB commands to quantify the amount of external libraries are used - no idea if any # is suspicious https://t.co/7L9dGfAjxb
0
5
20
@BarryV
BarryV
3 years
Member Turla signing Javascript malware? Serial Number: cd:fb:13:a3:e6:49:ec:c5:df:95:db:88:ca:c1:3f:fb
0
2
14
@tylabs
Tyler McLellan
3 years
Mandiant Blog - Turla: A Galaxy of Opportunity https://t.co/Alh37xmdmv This is Mandiant’s first observation of suspected Turla targeting Ukrainian entities since the onset of the invasion.
Tweet card summary image
cloud.google.com
A suspected Turla Team operation distributing a reconnaissance utility and backdoor to malware victims in Ukraine.
@tylabs
Tyler McLellan
3 years
In September 2022 Mandiant Managed Defense detected data staging and exfiltration at a Ukrainian organization. Digging into this incident, we discovered QUIETCANARY (aka Tunnus), a suspected Turla Team backdoor, was the source.
0
24
34
@MalwareJake
Jake Williams
3 years
What's the technical term for when you've absorbed so much technical debt you're spending all your time addressing support issues rather building?
396
80
1K
@Big_Bad_W0lf_
John
3 years
If we’re gonna haggle/argue over terminology can it please be thrunt.
11
2
33
@gabby_roncone
Gabby Roncone 🇺🇦 🇵🇸
3 years
the elites don’t want you to know this, but this is actually sandworm
5
5
54
@tylabs
Tyler McLellan
3 years
Likely Russian actor distributed trojaned copies of Windows OS:
4
12
45
@JWilsonSecurity
Jared Wilson
3 years
Mandiant observed a POORTRY sample signed with a Microsoft Windows Hardware Compatibility Authenticode signature. Further analysis led to a larger investigation into malicious drivers signed via the Windows Hardware Compatibility Program. 😱🌶️🔥 https://t.co/XFhESLLWxV
2
38
71
@TomHegel
Tom Hegel
3 years
New from @SentinelOne and @Mandiant: Targeted Attacks Leverage Signed Malicious Microsoft Drivers: 🟣 https://t.co/qGL5uN9Kdy 🟣
0
34
90
@BarryV
BarryV
3 years
10th anniversary of Mandiant APT1 report Cyber-truther to Qanon evolution begins
0
1
1