Cat
@coolestcatiknow
Followers
2K
Following
4K
Media
208
Statuses
1K
Infosec-er, nerd, artist and vet. Work @mitreattack as a leader and contributor. πππ§π©βπ». Opinions are like π°π³, they change the more you know.
Denver, CO
Joined June 2017
I π» speaking at #OBTS! Thank you @objective_see and @MITREattack for making this presentation happen! ATT&CKing Pandas: Drawing out ATT&CK Techniques in the Wild - slides... https://t.co/Y9D4LfN0uv πThank you to @MiscreantsHQ for the amazing artwork! π¨ comics in π§΅
8
13
42
For anyone who wants to understand certificates better and how to spot abuse, this is a great read (by @SquiblydooBlog ) https://t.co/55pMCg266s
2
27
96
Some strange Linux sample named "agent" seen from France: a18c29c72d1808477727ec2a611cee0f22ecd435457265bcf10823e0980c3636 microsoftonline[.]download "ShrekWare2024" "Robust TCP-based Reconnaissance C2 Agent Started" π€ π€·ββοΈ
10
7
30
I reverse engineered iMessage so it sends you a notification whenever someone starts typing... Here's how it works. 1. The app injects its own code into the iMessage app using DYLD_INSERT_LIBRARIES to hook into its internal methods 2. Dynamically loads Apple's private
71
34
2K
π¨The IP 23.27.140[.]49 metioned in the report also hosts an #ELF sample 298ef0317beb4d6c3e1f1dbe1ee6f244 This file is actually linux variant of the #BADCALL #Backdoor, which is attributed to the #Lazarus #APT group. πΈ#IOC #C2 is 23.27.177[.]183.πΈ Happy hunting π· @Xlab_qax
#kimsuky Malware HttpTroy #lazarus BLINDINGCAN remote access tool upgraded version https://t.co/503xrx8DDs
2
13
57
Incase you missed it, I dropped my new book βThreat Hunting macOSβ last month. You can purchase it from my website if youβre interested! https://t.co/wOlMwj3NkU
themittenmac.com
https://youtu.be/OnIAmOz0TjoChapter 1https://youtu.be/9bQCWbe2kDwChapter 2Now Available in the U.S.Welcome to my latest book.Β Threat Hunting macOSβa book that share
0
5
30
Arctic Wolf Labs reports that the China-linked threat actor UNC6384 targeted European diplomatic entities in Hungary and Belgium during September and October 2025, exploiting ZDI-CAN-25373 and deploying PlugX RAT malware. https://t.co/nMkh0jeqyc
0
38
73
Many asked Stuart (@stuartjash), how he made his slides so π₯for his recent #OBTS v8 talk. He was kind enough to make an explainer video, that we've added to our YouTube channel: Watch: "WeTalks - Keynote tutorial (Part 1): Keynope to Keydope"
1
8
45
Alright here's another interesting one. More infostealer stuff but worth a look. There's a couple parts to this so I'll attempt to summarize. Thanks @malwrhunterteam for sharing :) Starting with the initial mach-O, (readable strings?!?!) Ugly plist for persistence. π§΅
1
7
34
Palo Alto's Unit 42 team investigate the Jingle Thief campaign operated by financially motivated Morocco-based attackers. The attackers use phishing & smishing to steal credentials, to compromise organizations that issue gift cards. https://t.co/Fixf1j0OOs
0
20
45
A FortiGuard article examines methodologies employed to identify strategic connections between Winos 4.0 attack campaigns across Asia, revealing how seemingly unrelated attacks are linked through shared infrastructure, code patterns & operational tactics https://t.co/wuGoONfyhl
0
23
84
Elastic Security Labs publishes nightMARE, a Python library (v0.16) for malware analysis and for building configuration extractors. https://t.co/Cdofl8Lazn
0
43
145
Now freely live streaming on our YouTube channel: #OBTS v8 (Day #1) π https://t.co/7qwbworxHq ππ₯πΏ
youtube.com
The Objective-See Foundation is a non-profit 501(c)(3) organization. https://www.objective-see.com/ The Foundation focuses on: The creation of free, open-source macOS security tools. The writing of...
0
14
20
Finally, my DEF CON talk is now available on YouTube. In this presentation, I explore how DPRK threat actors have evolved, expanding, collaborating, and restructuring their internal operations. The session dives deep into how these organizational shifts, combined with technical
5
76
296
Say hi to them β check out our latest research!
@hexacon_fr 2025 is here! This week (Oct 10β11), our researchers Xiaobye (@xiaobye_tw) and Pumpkin (@u1f383) hit the Paris stage with vulnerability research on MediaTek Wi-Fi and Linux io_uring. Big debut for our young talents at Hexacon! π₯
0
8
106
DomainTools researchers look inside Salt Typhoon, a Chinese state-sponsored cyber threat group aligned with the Ministry of State Security (MSS), specializing in long-term espionage operations targeting global telecommunications infrastructure. https://t.co/tNE0zllDRJ
0
12
24
Check Point Research is tracking a long-running campaign by the Iranian threat actor Nimbus Manticore. The ongoing campaign targets defence manufacturing, telecommunications, and aviation sectors in Europe. https://t.co/7dSgIJCPic
0
24
51
Had an incredible time working on this case! π Proud to share my first contribution to @TheDFIRReport, I learned so much from investigating this case and can't wait to contribute more βΊοΈπΌ
πNew report out today!π From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion Analysis/reporting completed by @RussianPanda, Christos Fotopoulos, Salem Salem, reviewed by @svch0st. Audio: Available on Spotify, Apple, YouTube and more! Report:β¬οΈ
11
21
170
Lateral movement getting blocked by traditional methods? @werdhaihai just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code.
specterops.io
DCOM lateral movement BOF using Windows Installer (MSI) Custom Action Server - install ODBC drivers to load and execute DLLs
1
116
284