
Stuart Ashenbrenner ๐บ๐ธ ๐จ๐ฆ
@stuartjash
Followers
2K
Following
16K
Media
726
Statuses
7K
Principal macOS Security Researcher at @HuntressLabs | Creator of @Crash_Security | Reviewer at @bestthrillbooks | @MillennialGirlDad on @SubstackInc
Portland, OR
Joined March 2016
My slides (there are 123 of them ๐) for my presentation "The (mis)Education of macOS Security Internals" at @MacDevOpsYVR are available over on GitHub. Such a blast being here in Vancouver ๐จ๐ฆ https://t.co/TJzPRP6Upw
2
24
103
Also a huge shoutout to @birchb0y for being such a dope co-presenter the last two years and for rocking a fleece onesie in that room.
2
2
13
#OBTS was such a blast. Itโs so fun meeting all the newcomers and hanging out with all the people Iโve met at previous ones. Big mahalo to my adoptive parents, the OG mum & dad, @patrickwardle and @andyrozen for putting on an incredible conference, year after year.
1
3
18
Stuart (@stuartjash) and Alden (@birchb0y) (in a onesie! LOL) from @HuntressLabs gave a masterclass of a talk at #OBTS walking through novel NK/Chollima/BlueNoroff tradecraft targeting (especially #crypto users) OSX. Super talk!
1
6
20
5/ There were a lot of cool talks during those days! For example, @malwarezoo revealed a Gatekeeper flaw (CVE-2025-43296) that let revoked apps run again! ๐ฑ @birchb0y & @stuartjash talk on BlueNoroffโs malware targeting macOS. But the real MVP? The Blue's Clues costume ๐
1
3
7
Olivia (@oliviagalluccii) from @datadoghq entertained #OBTS, showing us how macOS logs everything, diving into ULS, ESF, and TCC.db to hunt threats like Atomic Stealer & XCSSET, and using tools like Consolation3, eslogger, Mac Monitor to catch evil!
2
7
35
Found an OG #OBTS picture from OBTSv1. Hard to believe this was seven years ago ๐คฏ amazed at how itโs quadrupled(?) in size.
Thankful that I got to spend a few amazing days in Maui with some amazing people at #OBTS. Thank you again @objective_see for all your work and your tools.
1
4
14
1
5
14
Awesome presentation delivered by @osint_barbie and @@nazargryschuk!! @moonlock_com and the research team is a great team to collaborate with, really recommend getting in touch with them!
0
6
11
@iamevltwin Back at it looking at BlueNoroffโs malware with @stuartjash & @birchb0y from @HuntressLabs #OBTS
1
4
11
The boys from @HuntressLabs deliver the goods, in an informative (and child friendly) way! ๐ถ Great analysis and breakdown of a targeted DPRK attack by @birchb0y and @stuartjash. #OBTS
1
5
21
Had a blast talking about public speaking and building slides ๐จ thank you for having me ๐
Mahalo to our wonderful mentors and mentees for making this happen!!! And special thanks to @patrickwardle, @jbradley89 and @stuartjash for presenting to our first ever cohort ๐ฅฐ I canโt wait to see everyoneโs presentations at #OBTSv8 in a couple of weeks!
0
0
3
Mahalo to our wonderful mentors and mentees for making this happen!!! And special thanks to @patrickwardle, @jbradley89 and @stuartjash for presenting to our first ever cohort ๐ฅฐ I canโt wait to see everyoneโs presentations at #OBTSv8 in a couple of weeks!
For #OBTS v8 we launched โWeTalksโ ๐ค A mentoring program pairing first-time speakers w/ mentors + group sessions from seasoned #OBTS speakers Sharing the sessions, as they're worth a watch for any speaker: https://t.co/ozbrb0uwLf Mahalo to @x71n3 & @andyrozen for organizing!
1
3
9
For #OBTS v8 we launched โWeTalksโ ๐ค A mentoring program pairing first-time speakers w/ mentors + group sessions from seasoned #OBTS speakers Sharing the sessions, as they're worth a watch for any speaker: https://t.co/ozbrb0uwLf Mahalo to @x71n3 & @andyrozen for organizing!
youtube.com
WeTalks is an initiative of the Objective-We program, created to help speakers improve their public speaking skills as they prepare to present at the #OBTS (...
0
6
22
I'm thrilled to share my latest blog post on Mach-Os, its role on macOS, and how it works with Apple's Code Signing and ARM's Pointer Authentication Codes (PAC). If you want to learn about Mach-Os in more depth, consider reading this post! https://t.co/XNQ76UzJJ4
#InfoSec
2
22
97
New RE Blog Post: RustyPages-Pt1 https://t.co/I2QdHgtRuy We RE a Rust dropper, that sets persistence and runs the downloaded next stage, queries @patrickwardle's tools, and quiets notifications. We included relevant IOCs as we continue our analysis of the loader for Part 2. :)
the-sequence.com
Kandji researchers discovered a Rust-based macOS malware, RustyPages. This post analyzes the dropper component, including its evasion tactics, persistence setup, and IOCs.
1
34
107
With "The Art of Mac Malware" Vol II now out, Iโve integrated its content into my #OBTS training: "The Art of Mac Malware: Detection & Analysis" ๐๐๐ฌ So if you want to learn the tools & techniques to uncover & analyze the latest macOS threats, sign up!
objectivebythesea.org
Learn the tools & techniques to comprehensively detect and analyze the latest threats targeting macOS.
0
7
36
So stoked to be speaking alongside @birchb0y at #OBTS v8 this year. The caliber of speakers on this dais are stellar. Can't wait to hang out in Spain with the Mac security community. Don't miss our Blue's Clues themed talk - featuring Steve and Blue ๐พ
๐ข Just dropped: the full #OBTS v8 talk lineup! https://t.co/WnHCvCdWqm And for the first time we'll have 3 full days of presentations! ๐คฉ Congrats to the selected speakers and mahalo to all who submitted. With ~100 submissions, selecting the final talks was a daunting task! ๐ซ
0
4
32