nosecurething Profile Banner
Matt Anderson Profile
Matt Anderson

@nosecurething

Followers
2K
Following
3K
Media
47
Statuses
644

Staff Detection Engineer @HuntressLabs Threat Research | Threat Hunting | Malware Analysis

Joined January 2011
Don't wanna be here? Send us removal request.
@nosecurething
Matt Anderson
2 months
Sharing our recent detection research and strategies for defendnot, a tool that creates a Malicious Security Product to disable Defender. We dive into:.- How it works.- Artifacts left behind.- How to build and layer robust detections.- Detection rules.
Tweet card summary image
huntress.com
"defendnot" bypasses Windows Defender using undocumented APIs. Learn detection strategies and robust defenses against this sophisticated evasion technique.
0
19
63
@nosecurething
Matt Anderson
21 days
RT @inversecos: Become a contributor at XINTRA @XintraOrg 🔎. We're looking for RED and BLUE team contributors . 🔴Red Team – Emulate real AP….
0
19
0
@nosecurething
Matt Anderson
25 days
RT @Antonlovesdnb: Coming up on my 1 year anniversary with @HuntressLabs ! . Taking this opportunity to go over some things myself and the….
0
47
0
@nosecurething
Matt Anderson
1 month
RT @ValidinLLC: Hot on the heels of the researched published by @HuntressLabs, hunting for Zoom-themed lures from DPRK's #BlueNoroff . 💥Lea….
Tweet card summary image
validin.com
Pivoting through recently-reported indicators to find BlueNoroff-associated domains
0
15
0
@nosecurething
Matt Anderson
1 month
RT @HuntressLabs: BlueNoroff (TA444) just dropped one of the most sophisticated macOS intrusions we’ve seen—deepfakes, fake Zoom links, and….
Tweet card summary image
huntress.com
Learn how DPRK's BlueNoroff group executed a Web3 macOS intrusion. Explore the attack chain, malware, and techniques in our detailed technical report.
0
29
0
@nosecurething
Matt Anderson
1 month
RT @Level_Effect: 🛠 Workshop Name:.Augmenting Detection and Response with AI.by Matt Anderson @nosecurething !. 🚨 Day 12 of Workshop Showca….
0
4
0
@nosecurething
Matt Anderson
1 month
RT @HuntressLabs: 👀 DPRK threat actors are now using deepfakes and fake Zoom links to socially engineer macOS users. Starts with a Telegra….
0
34
0
@nosecurething
Matt Anderson
1 month
RT @birchb0y: excited bc today @HuntressLabs is releasing our analysis of a gnarly intrusion into a web3 company by the DPRK's BlueNoroff!!….
Tweet card summary image
huntress.com
Learn how DPRK's BlueNoroff group executed a Web3 macOS intrusion. Explore the attack chain, malware, and techniques in our detailed technical report.
0
95
0
@nosecurething
Matt Anderson
1 month
RT @_JohnHammond: gawd daaayyuumm this is cool.web3 company intrusion.zoom/google meets phish.mac malware.nim and go and applescript and ob….
Tweet card summary image
huntress.com
Learn how DPRK's BlueNoroff group executed a Web3 macOS intrusion. Explore the attack chain, malware, and techniques in our detailed technical report.
0
32
0
@nosecurething
Matt Anderson
2 months
RT @JonnyJohnson_: Have you ever wondered if there was a way to deploy a "Remote EDR"? Today I'm excited to share research I've been workin….
0
126
0
@nosecurething
Matt Anderson
4 months
RT @gleeda: ✅Are you well versed in Linux? .✅Do you understand Linux internals and eBPF?.✅ Do you like building out POCs?.✅Do you understa….
0
11
0
@nosecurething
Matt Anderson
6 months
New @huntress blog where @birchb0y @Laughing_Mantis and I tell the story of 🕵️and 🤜 ➡️🗑️ some cyber espionage activity in 2024. Always feels good to learn something interesting and then use it to stop real threats with our team at Huntress! 💪
Tweet card summary image
huntress.com
Huntress discovered RedCurl activity across several organizations in Canada going back to 2023. Learn more about how this APT operates and how they aim to remain undetected while exfiltrating...
0
6
34
@nosecurething
Matt Anderson
7 months
RT @stuartjash: ICYMI: @birchb0y and I spoke about macOS infostealers at #OBTS and dove into some of the interesting ones. @objective_see….
0
12
0
@nosecurething
Matt Anderson
7 months
Fantastic new blog from the amazing @Antonlovesdnb on initial access trends we're seeing. Check it out!.
@Antonlovesdnb
Anton
7 months
Got a new blog out today looking at some of the initial access methods the @HuntressLabs tactical response team has come across lately - check it out! .
1
2
7
@nosecurething
Matt Anderson
7 months
RT @sublime_sec: Freight-forwarding fraud, which can target shipping containers full of goods, is on the rise as a lucrative alternative to….
0
1
0
@nosecurething
Matt Anderson
7 months
Wanted to learn 0⃣1⃣ 🥷specifically, but I learned a ton more! ❤️the format, using videos & written guides for all the content. Amazing Binja-specific material. Analyzing real malware. Nothing else like IMBT @InvokeReversing .🔥 Enjoyable, excellent course! (great price too).
@InvokeReversing
Invoke RE
7 months
Huge congrats to @nosecurething for finishing the IMBT Binary Ninja Edition course!
Tweet media one
1
6
30