Opens profile photo
Follow
Click to Follow craiu
Costin Raiu
@craiu
Romanian antihacker from another planet; chief paleontologist; director of Global Research and Analysis Team at . Tweets are my own. #chess #taekwondo
Technology-Security CompanyBucharestkaspersky.com/about/security…Joined October 2007

Costin Raiu’s Tweets

Great overview of major Turla ops from Andy, '96 to present. Long term, a smaller, dedicated and less resourceful group of smarter people overtakes a larger group with a bigger budget, eg. Sofacy.
Quote Tweet
From the first-ever foreign state cyberspying operation to a USB worm that infected air-gapped PCs to hiding in satellite comms to hijacking the infrastructure of other hackers, Turla’s persistence and ingenuity have made it “adversary #1” as Johns Hopkins’ Thomas Rid puts it.
Show this thread
1
27
Do you remember 's tweet about his YARA rule based on the Volatility plugin published by - well, there's an old Snake sample on VT with a match - out.exe (often used when carved from mem) Tweet twitter.com/msuiche/status Sample virustotal.com/gui/file/fc680
Image
Image
Image
Quote Tweet
Just wrote a memory-focused YARA rule based on the Volatility plugin published at the end of the Snake Malware report. 🗒️ gist.github.com/msuiche/8c8fd2 You can use it with the latest release of @MagnetForensics AXIOM Cyber 7.0 that supports our new memory analysis capabilities and… Show more
2
83
Show this thread
Same with the Yara rule, sadly.
Quote Tweet
Unfortunately I must advise against using the CISA Suricata rules for Snake (http & http2), they're incredibly vague and will absolutely bury you in FPs from the moment they're activated. We're looking at alternatives. cisa.gov/news-events/cy
Show this thread
Image
2
14
🔍 Pivoting on Dragos IoCs reported today: Focusing on 162.33.179.126:53 with hash:-208508626, discovered a small cluster 🎯: 1️⃣ 162.33.179.157 2️⃣ 162.33.179.126 3️⃣ 162.33.179.153 4️⃣ 162.33.179.165 5️⃣ 162.33.179.82 Investigating 162.33.179.165 relations 🕵️: 📁 Show more
Image
3
93
Show this thread
Dear , considering that you won't allow me to renew my licence, I'd appreciate it if you either: a) Granted me an OSS dev license, considering the value I bring to your customers for free b) Refrained from using my work for PR purposes Cheers
Quote Tweet
#Gepetto keeps the first position for the second month in a row! Good job @JusticeRage 👏 Got a plugin that could be on the top of the chart? Publish it, and let’s see 🌐 plugins.hex-rays.com//?utm_source=S #IDAPlugin #PluginRoundup #IDAPro #IDAPython
Plugin Repository Monthly Roundup: April 2023
5
81
Two years ago the SolarWinds hack made history as the boldest, most sophisticated supply chain hack ever pulled off. I dug into the detailed story about the ingenious way the hackers pulled it off - and then got caught - in this tale for WIRED magazine
13
668
Show this thread
In my free time I hang out silently in Slack workspaces or on Discord servers on which red teamers discuss how to evade AV signatures, take notes and write sigs for that shit - it's a pretty satisfying hobby
19
437
Quantum restaurant, you don’t know if it’s smoking or non smoking until you enter
Image
3
23
Got a phishing related job opening? I can't believe how hard it is to find employment for a * trilingual * permanent JP resident * experienced * open to everything dude like me. HR bounces don't give reasons but my age of 59Y may play a role. I'm still good for another 10 years!
15
The methods used by the Pinduoduo app in China are highly unusual. There are couple of scenarios of what might have happened here, and all of them are bad: -Pinduoduo is hacked -Pinduoduo has a malicious insider -Pinduoduo lost their signing key -Pinduoduo hacked their own users
Quote Tweet
“We haven’t seen a mainstream app like this trying to escalate their privileges to gain access to things that they’re not supposed to gain access to,” said @Mikko Hyppönen, chief research officer at WithSecure, a Finnish cybersecurity firm.
Show this thread
2
61