Bex
banner
4n6bexaminer.bsky.social
Bex
@4n6bexaminer.bsky.social
Livin' the DFIR Lyfe | Incident Response Manager @ Canva | CuratedIntel Member | Stubborn Western Australian working in infosec | Thoughts are my own
NYPD apparently has some rad new tech called blunt-force crackers but they still failed to get access to a teenager's laptop 🥲 had to rewind a couple of times to make sure I was hearing what I thought I was hearing and then turn subtitles on as well 🤣
December 17, 2024 at 4:06 PM
Just a little bit over a year since the arrests associated with bulletproftlink (BPL). Shame it didn't result in any charges. This visualisation is of bitcoin transaction activity assoc. with wallet addresses I attributed to BPL with a high level of confidence. Not exhaustive.
Decided to update my visualisation of Bitcoin transaction activity associated with a threat actor I've been tracking for 3 years. Threat actor's Bitcoin addresses (blue nodes) identified via #OSINT on forums, chat, social media, and publicly accessible file/text sharing sites.
November 15, 2024 at 10:34 AM
Had so many new followers than avg come in I had to turn off notifications for my sanity (I have notifications off for most platforms). I haven't been paying attention. Why the sudden surge? 😅 You don't all look like bots
November 15, 2024 at 9:13 AM
AMOS mixing it up a bit? base64 encoded curl command to download and sign macho from hxxps[://]megantic[.]online/te/Setup tria.ge/240810-q2exv... C2 hxxp[://]109.120.176[.]156/joinsystem

dmg for "cracked" software found via haxmac[.]cc urlscan.io/result/7f856...

#atomicstealer
August 11, 2024 at 11:29 AM
What is old is new again, #atomicstealer being distributed via #clearfake campaign. Haven't seen that in a while!

Clearfake domain: cejecuu4[.]xyz
C2: 193.124.185[.]23

Payload staged in Dropbox

#macosmalware #infostealers #amos #fakebrowserupdates #fakechrome
August 6, 2024 at 7:08 AM
This #macOS #stealer #malware isn't immediately recognisable to me. DMG and app file masquerading as The Unarchiver, uses Swift to capture password, downloads secondary payload containing shell scripts to collect, stage, and exfil data to c2 hxxp[://]81.19.137[.]179/api/index.php
July 29, 2024 at 11:03 AM
Decided to update my visualisation of Bitcoin transaction activity associated with a threat actor I've been tracking for 3 years. Threat actor's Bitcoin addresses (blue nodes) identified via #OSINT on forums, chat, social media, and publicly accessible file/text sharing sites.
August 27, 2023 at 12:10 PM
Oooo I arrived in Sydney to hear I came 2nd in the IR CTF at #bsidesperth 🥳 started before bed last night, shame I didn't have more time to play and wasn't there today - yesterday was fun. Thanks all!!!
August 20, 2023 at 2:00 PM
Rick rolling while bowling
August 6, 2023 at 9:21 AM
I'm performing in Sydney in a few weeks.
August 4, 2023 at 9:40 AM
Do animated gifs work yet? Probably not. This is even more amazing animated. I am pleased I can contribute to the cyber security profession with such masterpieces.
July 28, 2023 at 11:54 AM
Experimenting with an app (Aeon Timeline) I can use on both desktop and mobile devices to create timelines and mindmaps/network graphs. It's not setup for cybersecurity/OSINT so I'm having fun adding entity/data types, properties, and relationships.
July 24, 2023 at 1:16 PM
This is meant to be animated but I don't think animated gifs work 🥲 Just imagine stars shooting out from behind the planet like fireworks #canvalife #dfirlyfe
July 19, 2023 at 1:44 PM
Reposted by Bex
Like 90% of my twitter followers came from a terrible pun that somehow got retweeted by SwiftOnSecurity and I really don’t know how to replicate that overnight success here.
May 10, 2023 at 12:54 AM
I need more laptop for my stickers
July 17, 2023 at 1:28 PM
My new bluesky account is just as bare as my new laptop shell case 😱
July 12, 2023 at 6:57 PM