June 9, 2022
A userland rootkit is pretty weak. There are some easy ways to detect it. The simplest is to just use a staticky linked binary, like busybox
, rather than the utilities on the compromised box. Honestly, I thought this was standard practise, so I’m a bit surprised that a userland rootkit can defeat live forensics.
-
Big SIGINT energy.
“People were asking ‘Well you know, I’m not sure we’re seeing a dip in ransomware, how do you know this; can you show me?' I would just say: how did we know? Really? We’re NSA,” said Joyce, alluding to the agency’s core mission of collecting signals intelligence. “We heard them say they can’t get their money out. We heard them say that they can’t buy infrastructure.
-
-
-
-
-
-
-
Do yourself a favour and read this thread. It is a wonderful journey.
-
-
-
-
-
-
Highly recommend reading Seriously Risky Business today.
-
-
I wouldn’t bet on it.
-
-
This is evil and incompetent. \o/
-
Great stuff in here.