Distinguished Malware Analyst @ Dragos.
Lead Analyst on TRISIS and PIPEDREAM.
He/Him
Aside from studying reverse engineering, I lift weights, play a lot of board games and try to keep my philosopher dog, Velma, entertained.
Here's an example of my work:
www.dragos.com/blog/analyzi...
Adam Foster and I tore into HID SEOS to build the first open-source implementation for Proxmark3.
This is our Black Hat Asia 2025 story → www.youtube.com/watch?v=mnhG...
#RFIDHacking #SEOS #CyberSecurity
Adam Foster and I tore into HID SEOS to build the first open-source implementation for Proxmark3.
This is our Black Hat Asia 2025 story → www.youtube.com/watch?v=mnhG...
#RFIDHacking #SEOS #CyberSecurity
Job Description: job-boards.greenhous...
CDP Description:
www.dragos.com/commu...
Job Description: job-boards.greenhous...
CDP Description:
www.dragos.com/commu...
www.youtube.com/watc...
www.youtube.com/watc...
Bottom line: Always verify your dependencies and their sources!
socket.dev/blog/9-ma...
6/6
Bottom line: Always verify your dependencies and their sources!
socket.dev/blog/9-ma...
6/6
I’d give this a low confidence assessment for malicious intent. That said, it's normal for analysts to reach different conclusions, and this isn't a criticism of Socket's solid technical analysis.
5/6
I’d give this a low confidence assessment for malicious intent. That said, it's normal for analysts to reach different conclusions, and this isn't a criticism of Socket's solid technical analysis.
5/6
- The packages are unpopular (even by Socket's metrics), so infection of new projects seems improbable.
- Why would existing projects switch to the malicious dependencies?
- There's no C2 code to confirm victims. How would an attacker know if this worked?
4/6
- The packages are unpopular (even by Socket's metrics), so infection of new projects seems improbable.
- Why would existing projects switch to the malicious dependencies?
- There's no C2 code to confirm victims. How would an attacker know if this worked?
4/6
3/6
3/6
2/6
2/6
This is not a supply chain attack in the traditional sense.
1/6
This is not a supply chain attack in the traditional sense.
1/6
ICS is fun. This blog covers the problem:
blog.softwaretoolbox.com/topserver-mo...
(H/T to Reid Wightman for inspiring this post)
(2/2)
ICS is fun. This blog covers the problem:
blog.softwaretoolbox.com/topserver-mo...
(H/T to Reid Wightman for inspiring this post)
(2/2)
“I live at 502 Westport Ave.”
“Sweet, I’m sending you a package.”
“Wait! If you talk to the mail carrier, my address is 501 Westport Ave.”
“Oh. So, you live at 501 Westport?”
(1/2)
“I live at 502 Westport Ave.”
“Sweet, I’m sending you a package.”
“Wait! If you talk to the mail carrier, my address is 501 Westport Ave.”
“Oh. So, you live at 501 Westport?”
(1/2)
How much does AI know about ICS protocols?
Does AI truly lower the barrier for entry? If not, is that an AI limitation or am I just "holding it wrong"?
Is it shortening my development time? Or solving some problems but creating new ones for a net-zero benefit?
2/2
How much does AI know about ICS protocols?
Does AI truly lower the barrier for entry? If not, is that an AI limitation or am I just "holding it wrong"?
Is it shortening my development time? Or solving some problems but creating new ones for a net-zero benefit?
2/2
I'm excited to share what I learn come February!
1/2
I'm excited to share what I learn come February!
1/2
EPIC Erebus for PCIe and DMA attack research: www.crowdsupply.com/...
3/3
EPIC Erebus for PCIe and DMA attack research: www.crowdsupply.com/...
3/3
Thorium Malware Pipeline: github.com/cisagov/t...
CTADL Static Taint Analysis Tool: github.com/sandialab...
2/3
Thorium Malware Pipeline: github.com/cisagov/t...
CTADL Static Taint Analysis Tool: github.com/sandialab...
2/3
1/3
1/3
You buy tasty popcorn, and the money funds the trip with an option to donate to teachers.
Check it out and support a good cause! I just bought a bunch for our weekly board game meetup :)
s.dgpopup.com/0o409evs/rp
You buy tasty popcorn, and the money funds the trip with an option to donate to teachers.
Check it out and support a good cause! I just bought a bunch for our weekly board game meetup :)
s.dgpopup.com/0o409evs/rp
@sam-hans0n.bsky.social and I share stories of malware we discovered while searching for ICS threats, and discuss our approach to assessing their reputation.
Don't Cry Wolf: Evidence-Based Assessment of ICS Threats
@sam-hans0n.bsky.social and I share stories of malware we discovered while searching for ICS threats, and discuss our approach to assessing their reputation.
Don't Cry Wolf: Evidence-Based Assessment of ICS Threats
So, save your old Windows ISOs and VMs, you might need them!
So, save your old Windows ISOs and VMs, you might need them!
ICYMI, we posted resources from our talk here:
gist.github.com/maya...
ICYMI, we posted resources from our talk here:
gist.github.com/maya...
deathmeta.bandcamp.com/album/malware
deathmeta.bandcamp.com/album/malware