the grugq's newsletter

Subscribe
Archives
May 5, 2022

May 5, 2022

This seems like possibly an important development.

Twitter avatar for @DecentialMedia
DeCential Media @DecentialMedia
thanks to @dguido of @trailofbits for helping explain a new US program that will help protect individuals who may be targeted for cyber-spying by foreign countries like China decential.io/features/fqd7m…
5:00 PM ∙ May 4, 2022
3Likes6Retweets

Strong endorse.

Twitter avatar for @InfoSecSherpa
InfoSecSherpa (Tracy Z. Maleeff) @InfoSecSherpa
📢Stop 👏making 👏up 👏new 👏names 👏for 👏Phishing👏
Twitter avatar for @CyberNews
CyberNews @CyberNews
#Cybercriminals are including #QR codes into #phishing attacks, a practice known as Quishing. #cybersecurity #cyberattack https://t.co/3qkRE0FyrX
6:39 PM ∙ May 3, 2022
1,610Likes238Retweets

Deep dive research

Twitter avatar for @AmarSaar
Saar Amar @AmarSaar
Last year, Apple shared a high-level overview of "Memory safe iBoot implementation". I thought it would be nice to reverse and write about it, hope you will find it interesting :)
saaramar.github.ioIntroduction to Firebloom (iBoot)
1:40 PM ∙ May 4, 2022
436Likes139Retweets


Twitter avatar for @iAmTheWarax
matthew. @iAmTheWarax
"honey, come quick. the t72s are clipping out of reality again."
Image
3:27 PM ∙ May 4, 2022
2,220Likes210Retweets

The Info Op is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.


There’s a lot of reassessment happening these days.

Twitter avatar for @CovertShores
H I Sutton @CovertShores
***NEW ANALYSIS*** The #Russian Navy is on paper one of the most powerful on the planet. Yet it has lost 4 or 5 vessels to enemy action. In a land war, against a country with barely any navy.
navalnews.comRussian Navy’s 5 Significant Losses In The Ukraine War So Far - Naval NewsThe Russian Navy has a massive numerical advantage over their Ukrainian foe. Yet they have lost 5 vessels, some major and some minor. All are significant.
9:09 AM ∙ May 4, 2022
4,886Likes1,092Retweets

You know what we need right now? Escalated tensions with china.

Twitter avatar for @JonKBateman
Jon Bateman @JonKBateman
Huge US-China tech news: @Dimi reports the US is “laying the groundwork” to sanction Hikvision under the Global Magnitsky Act. This would be a profound escalation of tech tensions—perhaps a turning point akin to Trump’s actions against Huawei. I think this is a mistake. 🧵
Twitter avatar for @Dimi
Demetri @Dimi
#CHINASCOOP - US moving towards putting #sanctions on #Hikvision, Chinese firm that sells surveillance cameras to 1000+ cities in 180+ countries. https://t.co/mWcIAVUuar
4:52 PM ∙ May 4, 2022
277Likes125Retweets

Maybe they’re playing with the wrong people?

Twitter avatar for @JackieGSchneid
Jacquelyn Schneider @JackieGSchneid
New paper out with @bhschechter & @rachaelmshaffer in @Journal_of_GSS! A Lot of Cyber Fizzle But Not A Lot of Bang: Evidence about the Use of Cyber Operations from Wargames academic.oup.com/jogss/article-… @HooverInst @NWC_CIPI
Image
1:30 AM ∙ May 4, 2022
78Likes21Retweets

Another story about people staying with Russian soldiers.

https://breakingdefense.com/2022/05/russian-troops-held-me-captive-at-gunpoint-for-two-weeks-in-ukraine-heres-what-i-learned/

Earlier story was in May 4 2022.


There’s good psyops happening.

Twitter avatar for @EuromaidanPR
Euromaidan PR @EuromaidanPR
A website has appeared with a countdown clock insinuating that the Kerch Bridge will be destroyed on May 9th. It urges people in Crimea to leave before then. Is this psyops or reality? crimeanbridgedown.com.ua
6:56 PM ∙ May 4, 2022
432Likes104Retweets

This is a nice trick being used in the wild. I strongly endorse @SimonZerafa’s naming suggestion — Event Horizon.

Twitter avatar for @legezo
Denis Legezo @legezo
In February 2022 we observed the technique of putting the shellcode into Windows event logs for the first time “in the wild” during the malicious campaign. It allows the “fileless” last stage Trojan to be hidden from plain sight in the file system.
securelist.comA new secret stash for “fileless” malwareWe observed the technique of putting the shellcode into Windows event logs for the first time “in the wild” during the malicious campaign.
11:39 AM ∙ May 4, 2022
152Likes59Retweets

Mind blown

Twitter avatar for @JaeJaeykim2
Jae Yeon Kim @JaeJaeykim2
Most of the time citizens interact with the govt via forms rather than elections.. how much time do we (political scientists) think and are concerned about these forms??
1:28 PM ∙ Apr 30, 2022
13Likes2Retweets

ESET explaining bad code similarly analysis and the fallout.

Twitter avatar for @ESETresearch
ESET research @ESETresearch
Code similarity is a common and powerful way to cluster malware samples and make connections between seemingly unrelated malware families. Although it sounds simple, it is actually a complex problem and is hard to automate at scale without generating false positives. 1/
5:53 PM ∙ May 4, 2022
181Likes66Retweets

I so love these indictments.

Twitter avatar for @emptywheel
emptywheel @emptywheel
Just getting to the Wilson Statement of Offense. Who knows if Twitter will kill this all again.
Starting with this advice for @thegrugq justice.gov/usao-dc/press-…
Image
9:42 PM ∙ May 4, 2022
316Likes105Retweets

South Korea is part of NATO cyber.

Twitter avatar for @CollinSLKoh
Collin Koh 🇸🇬🇺🇦 @CollinSLKoh
South Korea's state intelligence agency said Thursday it has joined a cyber defense group under the North Atlantic Treaty Organization (NATO) as the first Asian member.
en.yna.co.krS. Korea’s spy agency joins NATO cyber defense group | Yonhap News AgencySEOUL, May 5 (Yonhap) -- South Korea’s state intelligence agency said Thursday it has...
1:50 AM ∙ May 5, 2022
92Likes50Retweets

Reading material.

Twitter avatar for @MattDevost
Matt Devost @MattDevost
An inquiry from @mtanji reminded me that this 20 year old resource still exists. You might be surprised by the collection of terrorism, cybersecurity and geopolitical risk documents. All primary source material and many unavailable anywhere else:
oodaloop.comTERRORISM REFERENCE CDROM
10:02 PM ∙ May 4, 2022
27Likes8Retweets

Some hot AI threads

Twitter avatar for @WriteArthur
Arthur Holland Michel @WriteArthur
21/ Similarly, the system’s anti violence filters obviously wouldn’t allow a user to generate an image of a dead horse in a pool of blood, but it will happily generate “a photo of a horse sleeping in a pool of red liquid;”
Image
2:19 PM ∙ Apr 8, 2022
54Likes9Retweets

If you trained an AI on unmoderated Reddit comments what would you get? Hint: extremely toxic AI

Twitter avatar for @WriteArthur
Arthur Holland Michel @WriteArthur
Meta has released a huge new AI language model called OPT-175B and made it available to a broad array of researchers. It also released a technical report with some truly extraordinary findings about just how dangerous this machine can be. 🧵 #AI #OPT175B
10:59 PM ∙ May 4, 2022
926Likes364Retweets

And another. An AI trained to invent “non toxic drugs” is great at 2 out of 3 of those things

Twitter avatar for @WriteArthur
Arthur Holland Michel @WriteArthur
Terrifying. These researchers built an AI for discovering less toxic drug compounds. Then they retrained it to do the opposite. Within six hours it generated 40,000 toxic molecules, including VX nerve agent and "many other known chemical warfare agents."
Twitter avatar for @NatMachIntell
Nature Machine Intelligence @NatMachIntell
Dual use in artificial intelligence is a growing concern. Read a Comment by Fabio Urbina, @FilippaLentzos Cédric Invernizzi and @collabchem about the risks in drug discovery https://t.co/Dgun0OpPMO
3:33 PM ∙ Mar 14, 2022
3,121Likes968Retweets

Good news, drone swarms can now hunt humans in the woods.

https://techcrunch.com/2022/05/04/swarming-drones-autonomously-navigate-a-dense-forest-and-chase-a-human/
Don't miss what's next. Subscribe to the grugq's newsletter:

Start the conversation:

Be the first to share your thoughts

X