Leonid Bezvershenko
@bzvr_
Followers
3K
Following
253
Media
41
Statuses
110
Senior Security Researcher @ Kaspersky, GReAT | Drovosec CTF team | Tweets are my own
Moscow, Russia
Joined September 2021
Today we share details about Operation Triangulation, a campaign targeting iOS devices of Kaspersky employees. It was an unprecedented investigation, and we've done a lot to study this campaign with great scrutiny. Report and IoCs here: https://t.co/t3w02W2DJy.
@kucher1n @2igosha
securelist.com
While monitoring the traffic of our own corporate Wi-Fi network, we noticed suspicious activity that originated from several iOS-based phones. Since it is impossible to inspect modern iOS devices...
6
34
120
Announcing the #TheSAS2025 #CTF winners! Congratulations to @C4TBuTS4D for taking the absolute win in the A/D and first-blooding 2 of the 4 services, including the trickiest one. Kudos to SKSD and dtl for their well-deserved 2nd and 3rd places. Every team received a check with a
0
6
10
After 24 hours without sleep and an insane amount of caffeine, we were able to win the MENA region league in Kaspersky CTF. And by that, our team secured a spot in SAS 2025 CTF final in Khao Lak, Thailand, on October 25-28. See you in Thailand (づ ̄3 ̄)づ╭❤️~
1
9
26
🚀 If you plan to join @kaspersky #CTF and want advice from a seasoned player, check out the webinar recording from yesterday! @bzvr_, one of the CTF organizers, shares the basics and practical examples to help you win in Kaspersky{CTF}. 🌴 Winners of the five regional
0
2
11
We're excited to announce our upcoming Capture The Flag (CTF) competition designed for corporate cybersecurity teams and academic institutions. Join us on August 30 for a 24-hour online challenge that will test your team’s skills in real-world threat scenarios. Form your squad.
1
3
6
A few weeks ago, I was responding to a cybersecurity incident - $500,000 have been stolen from a #blockchain developer. The infected operating system was freshly installed, and the victim was vigilant about cybersecurity. How could this happen? New supply chain attack? [1/6]
20
169
621
We have released four selected writeups for SAS CTF Quals. Check them out at https://t.co/4zB5c7BxRs !
sekai.team
Project SEKAI sasctf-2025-quals tagged content
Secured 2nd place at SAS CTF Quals with @r3kapig this weekend🎉Thanks to @TheSAScon for organizing the event and look forward to the finals in Thailand!
2
8
37
The hardcoded attacker-controlled cryptocurrency wallet addresses are: addresses = { "btc": "bc1qxpz2e8taktzesd0sd53lzmj87m5nkvu3fp82rk", "eth": "0x1842082Ff98E91495BDE6C6F9162F17AB9A9d3Cd", "ltc": "LVCC3oZgciRWWBENTvwXPPgsw2KKpmVR7x", "trx":
2
2
7
The malicious payloads are downloaded from 196.251.81[.]229 (2.txt, clippa.txt, and svchost.bat). clippa.txt is a clipper that uses the Pyperclip library to replace clipboard content with attacker-controlled addresses from its config.
1
4
13
🚨We just discovered 3 malicious Python packages uploaded to PyPI today that are typosquatting the popular crypto library fernet. The payload chain drops several files including a clipper that swaps BTC, ETH, SOL & many other wallet addresses. Details and IOCs in the thread 👇
3
22
67
Thrilled to announce we got 2nd place 🥈 with @ProjectSEKAIctf as P1G SEKAI last weekend and made it to the SAS CTF 2025 final! 🚀 Big shoutout to @TheSAScon for the amazing organization and innovative challenges 🧩 Can't wait to see everyone in Thailand! 🇹🇭🔥
0
4
24
We qualified for the SAS CTF finals by @TheSAScon once again this year🥳!! Looking forward to seeing everyone else in Thailand for the finals
0
2
26
Secured 2nd place at SAS CTF Quals with @r3kapig this weekend🎉Thanks to @TheSAScon for organizing the event and look forward to the finals in Thailand!
1
8
46
🚨 Less than 10 days until the SAS CTF 2025 Quals kick off! 🚨 Register your team now and claim the spot in the top 8 to compete for a share of the $18,000 prize pot at the on-site finals at the SAS conference in Thailand. Register: https://t.co/8ctDh4CC5W
0
14
25
🔐 Ready to test your skills? The SAS CTF 2025 qualifiers are open! Compete for a share of $18,000 and a spot at the Security Analyst Summit in Thailand. 🌏💻 ⏳ Online qualifiers: May 17 🏆 Finals: Oct 26–29 @ SAS 2025 Last year: 800+ teams battled—only 8 advanced. Will you make
0
1
5
I'm really happy to announce that we've just opened registration for the SAS CTF 2025 qualifying round!⛳️ This year's top 8 teams will qualify for the onsite finals to compete for a share of the $18.000 prize pool at the Security Analyst Summit conference in Khao Lak, Thailand
0
13
28
🎉 It’s official – #SAS2025 is coming! The world’s GReATest cybersecurity event returns with cutting-edge research, mind-blowing hacks, and the ultimate CTF finale. You won't want to miss this, book your place now: https://t.co/JWVeccqyVH
0
14
33
We (me + @2igosha) have discovered a new Google Chrome 0-day that is being used in targeted attacks to deliver sophisticated spyware 🔥🔥🔥. It was just fixed as CVE-2025-2783 and we are revealing the first details about it and “Operation ForumTroll”
securelist.com
Kaspersky GReAT experts discovered a complex APT attack on Russian organizations dubbed Operation ForumTroll, which exploits zero-day vulnerabilities in Google Chrome.
9
101
285
A new malicious package 'empty-validator-plugin' was uploaded to npm 3 hours ago. C2 server: 45.61.151[.]71
North Korean Lazarus hackers infect hundreds via npm packages - @billtoulas
https://t.co/BKHuaFhw8o
https://t.co/BKHuaFhw8o
1
10
47