c7zero Profile Banner
Yuriy Bulygin Profile
Yuriy Bulygin

@c7zero

Followers
4K
Following
2K
Media
73
Statuses
3K

@eclypsium, @CHIPSEC. Former @intel, @IntelSecurity, @McAfee

Joined April 2010
Don't wanna be here? Send us removal request.
@hasherezade
hasherezade
3 months
I've got some really cool gift recently... UEFI Petya PoC: https://t.co/NH0XgugFHB 😁
2
32
128
@securityweekly
Paul Asadoorian @[email protected]
4 months
The BadCAM research has been published! Why is this significant? Attackers can now weaponize connected USB peripherals that run Linux and do not validate firmware signatures.
1
10
22
@richinseattle
Richard Johnson
2 years
If you use llamafile, llama.cpp, llama-cpp-python, Oobabooga, LMStudio or any other software that exposes llama.cpp grammar sampling, I found a few remotely exploitable bugs triggered through a single web request that got patched today. More to come from my work at @Eclypsium
0
35
110
@BillDemirkapi
Bill Demirkapi
2 years
found a critical bug that exists in every Linux boot loader signed in the past decade 🥰 https://t.co/kjATsR4uvJ
@BillDemirkapi
Bill Demirkapi
3 years
Found my first UEFI vulnerability (signed bootloader OOB-W) 😊
17
122
543
@marcnewlin
Marc Newlin
2 years
I've been getting to know Bluetooth recently, and it is a scary place :)
4
38
133
@c7zero
Yuriy Bulygin
2 years
Added #downfall detection via content update
@eclypsium
Eclypsium
2 years
A recent update to the Eclypsium platform allows customers to detect one of the latest hardware attacks against Intel processors dubbed "Downfall." Downfall allows attackers to steal data from other processes, such as cryptographic keys. Fixes are available for certain platforms.
0
1
4
@a_greenberg
Andy Greenberg (@agreenberg at the other places)
3 years
Hundreds of models of Gigabyte motherboards, used in gaming and other high-performance computers, have a backdoor in their firmware that invisibly downloads code to the machine at startup—and does so insecurely, leaving the feature open to abuse.
Tweet card summary image
wired.com
Hidden code in hundreds of models of Gigabyte motherboards invisibly and insecurely downloads programs—a feature ripe for abuse, researchers say.
15
235
470
@eclypsium
Eclypsium
3 years
Eclypsium analysis found a backdoor in Gigabyte systems implementing intentional functionality during system startup. Due to significant #supplychainrisk, we're disclosing this info & defensive strategies on an accelerated timeline >> https://t.co/HgmUUmFPq2 #supplychainsecurity
Tweet card summary image
eclypsium.com
Eclypsium Research discovers that Gigabyte motherboards have an embedded backdoor in their firmware, which drops a Windows executable that can download and execute additional payloads insecurely. The...
4
43
81
@c7zero
Yuriy Bulygin
3 years
ShadowHammer campaign all over again but with MSI now
0
1
4
@Laughing_Mantis
Greg Linares (Laughing Mantis)
3 years
Attention anyone having an MSI motherboard or computer. MSI just said they were hacked and attackers might have tried modifying BIOS and software updates. Disable all updates from MSI for the time being https://t.co/7bm7yYT0Nv
Tweet card summary image
pcmag.com
The ransomware group is reportedly demanding $4 million or it will leak the stolen data, which includes company source code.
11
143
286
@c7zero
Yuriy Bulygin
3 years
Such a loss :(
@SummerC0n
Summercon
3 years
It is with profound sadness that we mourn the loss of our friend and mentor, @aloria. Kelly had an indomitable spirit, and our world is a bit darker without her.
0
0
0
@hasherezade
hasherezade
3 years
New release: #TinyTracer v2.3 : https://t.co/Ajq09c2TUQ - with improved syscalls tracing support - now syscalls are automatically mapped to corresponding functions names
7
160
489
@eclypsium
Eclypsium
3 years
It's no surprise that supply chain security has become a top national priority. In its recently-published SP 1800-34, NIST hones in on one of the most important, challenging aspects of #supplychainsecurity — devices. Here, we highlight the key takeaways.
Tweet card summary image
eclypsium.com
Today, virtually every business and mission-critical task depends on complex technology supply chains, and organizations need to know for certain that these assets are authentic, unaltered, and free...
0
5
6
@FlashbackPwn
Flashback Team
3 years
We finally released our research about an 0day RCE we found on the Western Digital PR4100 NAS device. Check it out on our NEW WEBSITE:
Tweet card summary image
flashback.sh
RCE with a plot twist.
0
49
121
@n0x08
🇺🇦 Nate Warfield | n0x08.bsky.social🌻
3 years
https://t.co/fFZc051E6C - I just uploaded the slides for my #BlueHat talk
1
20
63
@HackingThings
Mickey
3 years
Are you looking to learn about Bootkits, Rootkits, SMM or UEFI exploitation and debug? With this @_ringzer0 class you will gain hands-on experience in these and more! https://t.co/QIJl8Aspdy #RETURN23XPLOIT #offensivesecurity #Training
1
18
57
@c7zero
Yuriy Bulygin
3 years
New Year wish is for Russia to fuck off
0
0
8
@eclypsium
Eclypsium
3 years
Our team has discovered 3 vulnerabilities in American Megatrends, Inc. MegaRAC Baseboard Management Controller software.These vulnerabilities range in severity & include remote code execution & unauthorized device access w/superuser permissions.More here! https://t.co/Pirsj71UiR
0
3
13
@n0x08
🇺🇦 Nate Warfield | n0x08.bsky.social🌻
3 years
Very proud of this latest research coming out of my team here at @eclypsium 🤘 Watch for updates coming from OEMs in the coming days & make sure your BMC network is off the internet (we scanned, didn’t find much). Lock down your internal networks & use remote syslog.
@securityweekly
Paul Asadoorian @[email protected]
3 years
This is really awesome research from the team at Eclypsium (you likely need to patch something): https://t.co/fGHjoHhX0t
0
4
17