Boris Larin(@oct0xor) 's Twitter Profileg
Boris Larin

@oct0xor

Former console hacker (PS3/PS4). Hunting in the wild 0-days at Kaspersky GReAT. All tweets are my own.

ID:349306056

linkhttps://github.com/oct0xor/presentations calendar_today05-08-2011 22:10:22

626 Tweet

11,1K Takipçi

469 Takip Edilen

Boris Larin(@oct0xor) 's Twitter Profile Photo

Do you consider yourself a Security Researcher? It's time to submit your research to the Security Analyst Summit! thesascon.com/speakers

Do you consider yourself a Security Researcher? It's time to submit your research to the Security Analyst Summit! thesascon.com/speakers
account_circle
Yarden Shafir(@yarden_shafir) 's Twitter Profile Photo

As of build 25915 (latest Preview) all known API based kernel address leaks no longer work unless requested by a process with SeDebugPrivilege (only available to admin processes)

As of build 25915 (latest Preview) all known API based kernel address leaks no longer work unless requested by a process with SeDebugPrivilege (only available to admin processes)
account_circle
Maddie Stone(@maddiestone) 's Twitter Profile Photo

Google's 2022 Year in Review of in-the-wild 0-days is out! 4 key takeaways:
🤖N-days function like 0-days on Android
⚡️0-clicks and new browser mitigations drive down browser 0-days
👯Over 40% of itw 0-days are variants
💥Bug collisions are high


security.googleblog.com/2023/07/the-up…

Google's 2022 Year in Review of in-the-wild 0-days is out! 4 key takeaways: 🤖N-days function like 0-days on Android ⚡️0-clicks and new browser mitigations drive down browser 0-days 👯Over 40% of itw 0-days are variants 💥Bug collisions are high #itw0days security.googleblog.com/2023/07/the-up…
account_circle
Boris Larin(@oct0xor) 's Twitter Profile Photo

The story of the in-the-wild 0-days continues! CVE-2023-38606 is another kernel vulnerability that was used in the 0-click exploit chain. Discovered by Valentin Pashkov, Mikhail Vinogradov, Georgy Kucherin, Leonid Bezvershenko, and yours truly. Update all your Apple devices!

The story of the #iOSTriangulation in-the-wild 0-days continues! CVE-2023-38606 is another kernel vulnerability that was used in the 0-click exploit chain. Discovered by Valentin Pashkov, Mikhail Vinogradov, @kucher1n, @bzvr_, and yours truly. Update all your Apple devices!
account_circle
Maddie Stone(@maddiestone) 's Twitter Profile Photo

🎯Vlad Stolyarov clem1, Bahare, and I from Google TAG, discovered two new in-the-wild 0-days that were patched today: CVE-2023-36874 and CVE-2023-36884. Big thanks to Microsoft for the quick turn around on patches! 👏🏽

msrc.microsoft.com/update-guide/v…

msrc.microsoft.com/update-guide/v…

🎯@vladhiewsha @_clem1, Bahare, and I from Google TAG, discovered two new in-the-wild 0-days that were patched today: CVE-2023-36874 and CVE-2023-36884. Big thanks to Microsoft for the quick turn around on patches! 👏🏽 #itw0days msrc.microsoft.com/update-guide/v… msrc.microsoft.com/update-guide/v…
account_circle
Boris Larin(@oct0xor) 's Twitter Profile Photo

Today Apple released updates for CVE-2023-32434 (Kernel) and CVE-2023-32435 (WebKit) in-the-wild zero-days which were discovered by us (Georgy Kucherin, Leonid Bezvershenko and yours truly) in the attacks. Update your iOS/iPadOS/macOS/watchOS now!

Today Apple released updates for CVE-2023-32434 (Kernel) and CVE-2023-32435 (WebKit) in-the-wild zero-days which were discovered by us (@kucher1n, @bzvr_ and yours truly) in the #iOSTriangulation attacks. Update your iOS/iPadOS/macOS/watchOS now!
account_circle
Leonid Bezvershenko(@bzvr_) 's Twitter Profile Photo

Have you wanted to take your own look at the spyware? Well, we uploaded the implant to VirusTotal: virustotal.com/gui/file/fd9e9…

Have you wanted to take your own look at the #iOSTriangulation spyware? Well, we uploaded the #TriangleDB implant to VirusTotal: virustotal.com/gui/file/fd9e9…
account_circle
Georgy Kucherin(@kucher1n) 's Twitter Profile Photo

Our next blogpost on (securelist.com/triangledb-tri…) is finally out. Today we are ready to share details about the final payload used in the attack, which is a implant that we dubbed Leonid Bezvershenko Igor Kuznetsov [1/3]

account_circle
Donncha Ó Cearbhaill(@DonnchaC) 's Twitter Profile Photo

Insightful thread from Bill Marczak about the campaign from Kaspersky.

Our own hunting has found related domains back to 2018, including in English, Spanish, Portuguese and Chinese. Likely many more targets out there.. Will we see more targets come public?

account_circle
Eugene Kaspersky(@e_kaspersky) 's Twitter Profile Photo

Yesterday, we told you about . Today, we've got the tools to help you see if you are infected:

@securelist blog: securelist.com/find-the-trian…
GitHub: github.com/KasperskyLab/t…

account_circle
Security Response(@msftsecresponse) 's Twitter Profile Photo

Boris Larin Thanks so much for letting us know Boris Larin. We've updated the acknowledgement and will fix the bug that caused this miss. We appreciate your partnership to help secure customers.

account_circle
Boris Larin(@oct0xor) 's Twitter Profile Photo

We found a new zero-day (CVE-2023-28252) in Microsoft Windows used in Nokoyawa ransomware attacks
securelist.com/nokoyawa-ranso…

account_circle