
Andreas Klopsch
@hackingump1
Followers
823
Following
566
Media
15
Statuses
363
I published an article how BlackByte evades EDR by removing kernel callbacks via abuse of vulnerable driver Rtcore64.sys. #reverseengineering #malware #infosec #windows #cybersecurity #blackbyte #ALPHV #sophos #ida #ransomware #endpoint.
4
91
196
🚨 RIFT Update:.We’ve boosted our compiler detection! 🛠️.Now with sharper insights into binaries built using GNU, MinGW, and MSVC toolchains. More enhancements are on the way—stay tuned! 🔍✨.#ReverseEngineering #MalwareAnalysis #RIFT #malware #msft.
11
14
66
RT @MalwareRE: Do you find analyzing Rust binaries/malware tedious and unpleasant? You’re not alone! If you’re attending #REcon this year,….
0
14
0
Presenting "Unveiling RIFT: Advanced Pattern Matching for Rust Libraries" at RECON Montreal 2025!.Sharing research on discovering Rust dependencies in compiled binaries. See you there! 🚀.#RECON2025 #RustLang #ReverseEngineering.
0
3
9
The deep dive below into PebbleDash’s FakeTLS C2 protocol shows how North Korean APTs fake TLS handshakes and use hardcoded RC4 encryption to blend in with legit HTTPS traffic. #malware #infosec #reverseengineering #pebbledash #cybersecurity #windows.
1
1
2
RT @reconmtl: Recon CFP ends in less than 2 weeks on April 28. Prices for the training and conference increase on May 1st. Register now to….
0
16
0
🔍 Exploring Domain Generation Algorithms (DGAs) in Malware 🔍. Below is an article I wrote years ago, which explains the difference between seed based and dictionary based algorithms. #malware #infosec #cybersecurity #dga #dns.
0
1
5
RT @reconmtl: @hackingump1 will be presenting about "Unveiling RIFT: Advanced Pattern Matching for Rust Libraries" at Recon Montreal https:….
0
4
0
Symbolic Execution is powerful technique that explores all possible execution paths without actual inputs. An interesting display of this technique is below:. #malware #reverseengineering #cybersecurity #infosec #symbolicexecution.
0
0
0
Russia-Linked “BadPilot” Cyber Campaign Exposed 🚨. Microsoft has uncovered a multiyear global access operation executed by a sub group of Seashell Blizzard, a Russian nation state actor. #threatintel #cybersecurity #infosec #microsoft #mstic.
0
0
2
🚨 Secret Blizzard, a Russian nation-state actor exploits other hackers' infrastructure to evade detection & conduct espionage. 🔍 Learn more:. 🔗 Part I: 🔗 Part II: #CyberSecurity #ThreatIntelligence #malware #infosec.
0
0
0
🚀 MSTIC Uncovers STAR Blizzard Spear-Phishing Campaign Targeting WhatsApp Users. Microsoft has identified STAR Blizzard, a phishing campaign targeting WhatsApp accounts through social engineering. #threatintel #infosec #starblizzard #mstic.
0
0
1
Ever heard about "nanomites"? 🐞🖥️. By allowing a parent process to control its child, the technique can hinder reverse engineers from debugging a binary. #malware #cybersecurity #infosec #reverseengineering #nanomites.
0
5
22
The Process Environment Block (PEB) – A Hacker’s Playground?. More about PEB and how Lazarus/Diamond Sleet abused it in the past here:. #cybersecurity #malware #infosec #reverseengineering #peb #windows.
0
0
4
RT @MalwareRE: The Microsoft Threat Intelligence Center (MSTIC) is looking for malware reverse engineers and security researchers to join o….
0
39
0
The second part of the frequent freeloader blog series is out! MSTIC shares how Secret Blizzard abused tools of other threat actors to attack Ukraine. #malware #cybersecurity #infosec #threatintelligence #microsoft #mstic #secretblizzard.
0
0
0
RT @hackingump1: Aqua Blizzard, a group likely acting on orders of Russia's Federal Security Service (FSB), abuse cloudflare services to sp….
0
1
0