Distinguished Malware Analyst @ Dragos.
Lead Analyst on TRISIS and PIPEDREAM.
He/Him
Bottom line: Always verify your dependencies and their sources!
socket.dev/blog/9-ma...
6/6
Bottom line: Always verify your dependencies and their sources!
socket.dev/blog/9-ma...
6/6
I’d give this a low confidence assessment for malicious intent. That said, it's normal for analysts to reach different conclusions, and this isn't a criticism of Socket's solid technical analysis.
5/6
I’d give this a low confidence assessment for malicious intent. That said, it's normal for analysts to reach different conclusions, and this isn't a criticism of Socket's solid technical analysis.
5/6
- The packages are unpopular (even by Socket's metrics), so infection of new projects seems improbable.
- Why would existing projects switch to the malicious dependencies?
- There's no C2 code to confirm victims. How would an attacker know if this worked?
4/6
- The packages are unpopular (even by Socket's metrics), so infection of new projects seems improbable.
- Why would existing projects switch to the malicious dependencies?
- There's no C2 code to confirm victims. How would an attacker know if this worked?
4/6
3/6
3/6
2/6
2/6
ICS is fun. This blog covers the problem:
blog.softwaretoolbox.com/topserver-mo...
(H/T to Reid Wightman for inspiring this post)
(2/2)
ICS is fun. This blog covers the problem:
blog.softwaretoolbox.com/topserver-mo...
(H/T to Reid Wightman for inspiring this post)
(2/2)
How much does AI know about ICS protocols?
Does AI truly lower the barrier for entry? If not, is that an AI limitation or am I just "holding it wrong"?
Is it shortening my development time? Or solving some problems but creating new ones for a net-zero benefit?
2/2
How much does AI know about ICS protocols?
Does AI truly lower the barrier for entry? If not, is that an AI limitation or am I just "holding it wrong"?
Is it shortening my development time? Or solving some problems but creating new ones for a net-zero benefit?
2/2
EPIC Erebus for PCIe and DMA attack research: www.crowdsupply.com/...
3/3
EPIC Erebus for PCIe and DMA attack research: www.crowdsupply.com/...
3/3
Thorium Malware Pipeline: github.com/cisagov/t...
CTADL Static Taint Analysis Tool: github.com/sandialab...
2/3
Thorium Malware Pipeline: github.com/cisagov/t...
CTADL Static Taint Analysis Tool: github.com/sandialab...
2/3
And the blog post it references here by Orange and Splitline: devco.re/blog/2025/0...
Both of these are excellent write ups and great reads if you’re into vulnerability research, CTFs, or hacker history.
3/3
And the blog post it references here by Orange and Splitline: devco.re/blog/2025/0...
Both of these are excellent write ups and great reads if you’re into vulnerability research, CTFs, or hacker history.
3/3