☩MalwareMustDie
@malwaremustdie
Followers
6K
Following
327
Media
257
Statuses
692
Official account of MalwareMustDie, NPO. Info: https://t.co/131r5UW4bF Blog: https://t.co/lUnpKnXOqV
☩Psalm 115:1
Joined September 2018
For AJCCBC Malware Analysis class members feel free to DM me started with stated your full name and country first. Let’s keep in touch, we had a great week together!
0
0
2
Just wondering how many of us are actually rebooting (turning off and on again) our mobile phone devices everyday? #MalwareMustDie #Poll
0
6
6
U.S. Commerce Department Prohibits Russian Kaspersky Software for U.S. Customers https://t.co/reQ0jRBd72 Our comment: Completely AGREED.
1
0
2
#Blog: Back in 2015, where #Linux #Ransomware was started to came up to the surface, I posted an analysis that I forgot to post it in #MMD blog in English until just now.. So, I am sorry, better late than never. Here it is: https://t.co/s6WISaEI89
#MalwareMustDie!
1
2
8
#Blog: I re-posted my older #APT #PoisonIvy analysis in #MMD blog before it becomes /dev/null :) https://t.co/exNP6I5Zll
#MalwareMustDie!
0
5
8
On behalf of #MalwareMustDie team, I, @unixfreaxjp of #MMD would like to congratulate @virustotal (@virustotalnews) for the 20th Anniversary!! Congratulations friends, internet cyber security will not be the same if you are not around! Please keep up the great work for 20y more!
0
3
13
To #Malwaremustdie friends in Cyber Threat Intelligence field, there is still a chance to publish your research in next year's April at #FIRSTCTI24, please see the detail in the re-posted context. You can contact @FIRSTdotOrg for more info. Thanks! @unixfreaxjp
#cti #ctisig #mmd
Interested in speaking at #FIRSTCTI24? The #CallforPapers for this Berlin conference closes next week, December 13th. Get your submissions in now! For all #CFP details please see:
0
0
2
Thank you for all of friends for the amazing support along these 11years+. If you are following our #malwaremustdie/#MMD's twitter/x account @malwaremustdie up to now & got disconnected please follow this official account to keep in touch. -- MMD
0
1
13
We have executed the #TsurugiLinux basic training for Japan security community in #hackfes23 #Tokyo w/ @unixfreaxjp of #malwaremustdie as instructor. Wishing speedy recovery to @Sug4r7 & greets to @tsurugi_linux's dev friends @blackmoon105 @therebus from #Japan #dfir folks!
0
6
21
We wrote history of Tsunami/Kaiten #unix #malware here: https://t.co/l9TXF9096t to avoid confusion w/ STD that actually has different root, see: https://t.co/Ph9B7MhkkE Eventually codes then combined & #ELF bots evolved ever since. These are #root of most #Linux #botnet today.
0
13
30
Today, UK & US govts sanctioned members of Russia-based cybercrime gang #Trickbot. Our data shows #ransomware strains related to Trickbot extorted at least $724M worth of crypto, making Trickbot the 2nd highest earning cybercrime group, following the DPRK-linked Lazarus group.
1
3
2
今月の #SECCON で「シェルコード解析入門とその #DFIR ハンドリング」アドバンス向けワークショップその2を行う予定となります!前回のシェルコード講義の続き内容、前回の講義と同じセットアップ、参加者は45人迄、現地でやります。 早めに申し込んだ方がいいと思います↓ https://t.co/wjL2iTTq95
0
1
7
Everyone is playing with OpenAI, so I do too. That’s the openai plugin I wrote for @radareorg
3
36
138
Thanks @jimmychappell !
Henrick Adrian and Takehiko Kogen of LAC working with JPCERT on web skimmers on e-commerce site. rick walks us through a STRIDE threat model resulting from a real world attack #FIRSTCTI22
0
0
9
Good work by @SttyK! #Yanluowang #ransomware alleged actors. https://t.co/dRIv3eCsPi
https://t.co/iJMrusY8cM
https://t.co/3hwcLO3w1g Contact: https://t.co/qDFAfuQb0l
twitter.com
今の肩書で生きろ
Yanluowang Ransomware member #3 Aleksandrovich Vadim Solovyev #Yanluowang #ransomware
https://t.co/CofXo9VwuD
1
1
4