Andreas Klopsch Profile
Andreas Klopsch

@hackingump1

Followers
823
Following
566
Media
15
Statuses
363

Reverse Engineer @ Microsoft

Joined January 2020
Don't wanna be here? Send us removal request.
@hackingump1
Andreas Klopsch
3 years
I published an article how BlackByte evades EDR by removing kernel callbacks via abuse of vulnerable driver Rtcore64.sys. #reverseengineering #malware #infosec #windows #cybersecurity #blackbyte #ALPHV #sophos #ida #ransomware #endpoint.
4
91
196
@hackingump1
Andreas Klopsch
4 days
🚨 RIFT Update:.We’ve boosted our compiler detection! 🛠️.Now with sharper insights into binaries built using GNU, MinGW, and MSVC toolchains. More enhancements are on the way—stay tuned! 🔍✨.#ReverseEngineering #MalwareAnalysis #RIFT #malware #msft.
11
14
66
@hackingump1
Andreas Klopsch
11 days
RT @MalwareRE: Do you find analyzing Rust binaries/malware tedious and unpleasant? You’re not alone! If you’re attending #REcon this year,….
0
14
0
@hackingump1
Andreas Klopsch
2 months
RT @herrcore: Unpacking VMProtect 3 (x64) 🤷‍♂️
0
173
0
@hackingump1
Andreas Klopsch
2 months
Presenting "Unveiling RIFT: Advanced Pattern Matching for Rust Libraries" at RECON Montreal 2025!.Sharing research on discovering Rust dependencies in compiled binaries. See you there! 🚀.#RECON2025 #RustLang #ReverseEngineering.
0
3
9
@hackingump1
Andreas Klopsch
3 months
The deep dive below into PebbleDash’s FakeTLS C2 protocol shows how North Korean APTs fake TLS handshakes and use hardcoded RC4 encryption to blend in with legit HTTPS traffic. #malware #infosec #reverseengineering #pebbledash #cybersecurity #windows.
1
1
2
@hackingump1
Andreas Klopsch
3 months
RT @reconmtl: Recon CFP ends in less than 2 weeks on April 28. Prices for the training and conference increase on May 1st. Register now to….
0
16
0
@hackingump1
Andreas Klopsch
3 months
RT @reconmtl:
0
14
0
@hackingump1
Andreas Klopsch
3 months
🔍 Exploring Domain Generation Algorithms (DGAs) in Malware 🔍. Below is an article I wrote years ago, which explains the difference between seed based and dictionary based algorithms. #malware #infosec #cybersecurity #dga #dns.
0
1
5
@hackingump1
Andreas Klopsch
3 months
RT @reconmtl: @hackingump1 will be presenting about "Unveiling RIFT: Advanced Pattern Matching for Rust Libraries" at Recon Montreal https:….
0
4
0
@hackingump1
Andreas Klopsch
5 months
Symbolic Execution is powerful technique that explores all possible execution paths without actual inputs. An interesting display of this technique is below:. #malware #reverseengineering #cybersecurity #infosec #symbolicexecution.
0
0
0
@hackingump1
Andreas Klopsch
5 months
Russia-Linked “BadPilot” Cyber Campaign Exposed 🚨. Microsoft has uncovered a multiyear global access operation executed by a sub group of Seashell Blizzard, a Russian nation state actor. #threatintel #cybersecurity #infosec #microsoft #mstic.
0
0
2
@hackingump1
Andreas Klopsch
5 months
🚨 Secret Blizzard, a Russian nation-state actor exploits other hackers' infrastructure to evade detection & conduct espionage. 🔍 Learn more:. 🔗 Part I: 🔗 Part II: #CyberSecurity #ThreatIntelligence #malware #infosec.
0
0
0
@hackingump1
Andreas Klopsch
5 months
🚀 MSTIC Uncovers STAR Blizzard Spear-Phishing Campaign Targeting WhatsApp Users. Microsoft has identified STAR Blizzard, a phishing campaign targeting WhatsApp accounts through social engineering. #threatintel #infosec #starblizzard #mstic.
0
0
1
@hackingump1
Andreas Klopsch
5 months
🚨 Then vs. Now: The Evolution of DDoS Attacks 🚨. In 2016, Mirai's botnet caused chaos with a 1.2 Tbps DDoS attack(. Fast forward to 2025, and we’re now witnessing 5.6 Tbps attacks—nearly 5x the scale!. Mirai botnet was first.
0
0
1
@hackingump1
Andreas Klopsch
6 months
Ever heard about "nanomites"? 🐞🖥️. By allowing a parent process to control its child, the technique can hinder reverse engineers from debugging a binary. #malware #cybersecurity #infosec #reverseengineering #nanomites.
0
5
22
@hackingump1
Andreas Klopsch
6 months
The Process Environment Block (PEB) – A Hacker’s Playground?. More about PEB and how Lazarus/Diamond Sleet abused it in the past here:. #cybersecurity #malware #infosec #reverseengineering #peb #windows.
0
0
4
@hackingump1
Andreas Klopsch
6 months
UPnP. convenience at a cost?. Universal Plug and Play (UPnP) was designed to make our tech lives easier by allowing devices to seamlessly communicate on a network. But did you know this protocol has been a major security risk for years?. From exposing devices to external threats.
0
0
0
@hackingump1
Andreas Klopsch
7 months
RT @MalwareRE: The Microsoft Threat Intelligence Center (MSTIC) is looking for malware reverse engineers and security researchers to join o….
0
39
0
@hackingump1
Andreas Klopsch
7 months
The second part of the frequent freeloader blog series is out! MSTIC shares how Secret Blizzard abused tools of other threat actors to attack Ukraine. #malware #cybersecurity #infosec #threatintelligence #microsoft #mstic #secretblizzard.
0
0
0
@hackingump1
Andreas Klopsch
7 months
RT @hackingump1: Aqua Blizzard, a group likely acting on orders of Russia's Federal Security Service (FSB), abuse cloudflare services to sp….
0
1
0