r00tbsd Profile Banner
Paul Rascagnères Profile
Paul Rascagnères

@r00tbsd

Followers
17K
Following
8K
Media
26
Statuses
292

Lord of Loaders at @Volexity | Mastodon account: 🐘 @[email protected] | Bsky @r00tbsd.bsky.social

World
Joined April 2010
Don't wanna be here? Send us removal request.
@r00tbsd
Paul Rascagnères
1 year
We released a blogpost concerning #StromBamboo (aka Evasive Panda). @volexity was involved in an incident where the attackers compromised an ISP to poison the customers' DNS requests to hijack software updates (using the HTTP protocol): https://t.co/kaykYDxamh 1/3
Tweet card summary image
volexity.com
In mid-2023, Volexity detected and responded to multiple incidents involving systems becoming infected with malware linked to StormBamboo (aka Evasive Panda, and previously tracked by Volexity under...
4
33
80
@volatility
volatility
7 months
We are very excited to announce that Volatility 3 has reached parity with Volatility 2! With this achievement, Volatility 2 is now deprecated. See the full details in our blog post:
Tweet card summary image
volatilityfoundation.org
Visit the post for more.
3
157
356
@Volexity
Volexity
7 months
Congratulations to all of the Volatility contributors - this was no small feat! We are proud to be a sustaining sponsor of this important open-source project that remains the world’s most widely used memory forensics platform. #dfir
@volatility
volatility
7 months
We are very excited to announce that Volatility 3 has reached parity with Volatility 2! With this achievement, Volatility 2 is now deprecated. See the full details in our blog post:
0
5
14
@Volexity
Volexity
8 months
.@Volexity #threatintel: Multiple Russian threat actors are using Signal, WhatsApp & a compromised Ukrainian gov email address to impersonate EU officials. These phishing attacks abuse 1st-party Microsoft Entra apps + OAuth to compromise targets. https://t.co/31cinaoDfB #dfir
1
63
200
@attrc
Andrew Case
9 months
Check out this great research and new open source tool by our threat intel team!
@Volexity
Volexity
9 months
Today, @Volexity released GoResolver, open-source tooling to assist reverse engineers with obfuscated Golang samples. @r00tbsd & Killian Raimbaud presented details at INCYBER Forum earlier today. Learn how GoResolver works + where to download it: https://t.co/dZ4hNUBK1I #dfir
1
3
12
@Volexity
Volexity
9 months
Today, @Volexity released GoResolver, open-source tooling to assist reverse engineers with obfuscated Golang samples. @r00tbsd & Killian Raimbaud presented details at INCYBER Forum earlier today. Learn how GoResolver works + where to download it: https://t.co/dZ4hNUBK1I #dfir
1
49
119
@pivot_con
PIVOTcon
9 months
📣 Oops!... They did it again!!! 61 Talks submitted and so many too good that, once again, we had to increase a bit the number of accepted talks. 🔥 #PIVOTcon25 Agenda is finally here, and the caliber is insane!!! Check it out ➡️ link below in second post #CTI #ThreatIntel 1/19
2
20
32
@Volexity
Volexity
1 year
This talk is a great way to watch/listen to the details behind the work @stevenadair, @5ck, @tlansec + @volexity’s #threatintel & IR teams did to investigate the Nearest Neighbor Attack. The related blog post is here:
Tweet card summary image
volexity.com
In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever...
@volatility
volatility
1 year
We were happy to have @Volexity’s @stevenadair & @5ck present “The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access” for the #FTSCon Keynote in October. The video of their talk is now available here: https://t.co/0yi29E4Zsf. #dfir
0
4
13
@Volexity
Volexity
1 year
.@Volexity has developed a new #opensource tool, “HWP Extract”, a lightweight Python library & CLI for interacting with Hangul Word Processor files. It also supports object extraction from password-protected HWP files. Download here: https://t.co/WbOVktrmpA   #dfir #threatintel
Tweet card summary image
github.com
A library and cli tool to extract HWP files. Contribute to volexity/hwp-extract development by creating an account on GitHub.
1
39
84
@stevenadair
Steven Adair
1 year
Just gave a talk about the Nearest Neighbor Attack at #CYBERWARCON and had a great time detailing our findings. This was a lot of great work by our @Volexity team and special thanks to @5ck and @tlansec for the long hours working on it! Def. one of our wildest #DFIR engagements!
@Volexity
Volexity
1 year
.@Volexity’s latest blog post describes in detail how a Russian APT used a new attack technique, the “Nearest Neighbor Attack”, to leverage Wi-Fi networks in close proximity to the intended target, while the attacker was halfway around the world. https://t.co/R3aKyrjVYR #dfir
4
18
98
@Volexity
Volexity
1 year
.@Volexity’s latest blog post describes in detail how a Russian APT used a new attack technique, the “Nearest Neighbor Attack”, to leverage Wi-Fi networks in close proximity to the intended target, while the attacker was halfway around the world. https://t.co/R3aKyrjVYR #dfir
Tweet card summary image
volexity.com
In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever...
6
175
384
@5ck
5ck
1 year
@stevenadair and I presented on this last month at #FTSCon (IYKYK). Steven is also presenting today @CYBERWARCON. Really excited to finally share this research publicly! It's probably one of the more crazy/interesting IR engagements we've ever worked! #DFIR #ThreatIntel
@Volexity
Volexity
1 year
.@Volexity’s latest blog post describes in detail how a Russian APT used a new attack technique, the “Nearest Neighbor Attack”, to leverage Wi-Fi networks in close proximity to the intended target, while the attacker was halfway around the world. https://t.co/R3aKyrjVYR #dfir
1
10
17
@Volexity
Volexity
1 year
.@Volexity has published a blog post detailing variants of LIGHTSPY & DEEPDATA malware discovered in the summer of 2024, including exploitation of a vulnerability in FortiClient to extract credentials from memory. Read more here: https://t.co/mHBdbpIcdI #dfir #threatintel
Tweet card summary image
volexity.com
In July 2024, Volexity identified exploitation of a zero-day credential disclosure vulnerability in Fortinet’s Windows VPN client that allowed credentials to be stolen from the memory of the client’s...
0
50
83
@r00tbsd
Paul Rascagnères
1 year
Tomorrow I will do an unexpected talk about edge-security incidents at @hack_lu. I will present the behind the scenes of the recent incident responses where we have been involved. #hacklu
0
4
23
@xme
Xavier Mertens @[email protected] 🇧🇪
1 year
« #DFIR people have two best friends: strings and grep » (@r00tbsd) #QOTD
2
2
8
@volatility
volatility
1 year
There are only a few tickets left for #FTSCon & we are planning to close registration Monday! We are excited to see all of you & hear great talks by amazing speakers from across the industry. Register here: https://t.co/8ee3K4Kdk0 #dfir
Tweet card summary image
events.humanitix.com
From The Source - Hosted by the Volatility Foundation
0
5
6
@stevenadair
Steven Adair
1 year
We are hiring! Come join @Volexity's Threat Detection team. This is a SOC-type role with purview across our customers to identify suspicious & malicious activity using our telemetry across network, EDR/AV, email, logs & more! Take a look!
Tweet card summary image
volexity.com
Career Opportunity: Volexity is currently looking to hire Threat Detection & Response Analyst to join its rapidly growingservices team.
1
23
48
@Volexity
Volexity
1 year
@tlansec @volatility And here is another opportunity to hear a talk from @Volexity at #FTSCon on October 21: Steven Adair (@stevenadair) and Sean Koessel (@5ck ) will present "The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access" https://t.co/iZ5wvRGHjW
@volatility
volatility
1 year
We are excited to announce the opening keynote for #FTSCon: @Volexity's Steven Adair & Sean Koessel will present "The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access". Event details + how to register: https://t.co/xfDn513usL #dfir
0
5
3
@volatility
volatility
1 year
We are excited to announce the opening keynote for #FTSCon: @Volexity's Steven Adair & Sean Koessel will present "The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access". Event details + how to register: https://t.co/xfDn513usL #dfir
0
6
15