L0Psec (@l0psec) 's Twitter Profile
L0Psec

@l0psec

Father | macOS Security Researcher | RE | arm64 | InfoSec

ID: 914968294452588544

calendar_today02-10-2017 21:40:15

2,2K Tweet

2,2K Followers

1,1K Following

L0Psec (@l0psec) 's Twitter Profile Photo

New RE Video: youtube.com/watch?v=3imRXE… In this video, I analyze a recent DPRK attributed Mach-O. Not a complicated sample, however does highlight some strange function calling which may interfere with static analysis. Enjoy! :)

Raaz (@solostalking) 's Twitter Profile Photo

Found multiple #Clickfix domains connecting to odyssey1[.]to:3333 AMOS Malware 45[.144.233.192 83[.222.190.250 185.39.206.183 appmacosx[.com financementure[.com appsmacosx[.com macosxapp[.com macosapp-apple[.com macapps-apple[.com macapp-apple[.com republicasiamedia[.com

Found multiple #Clickfix domains connecting to odyssey1[.]to:3333 AMOS Malware

45[.144.233.192
83[.222.190.250
185.39.206.183
appmacosx[.com
financementure[.com
appsmacosx[.com
macosxapp[.com
macosapp-apple[.com
macapps-apple[.com
macapp-apple[.com
republicasiamedia[.com
Ferdous Saljooki (@malwarezoo) 's Twitter Profile Photo

BlueNoroff has been actively targeting victims in the crypto space. On macOS, they've used Script Editor for initial access and now leveraging Automator to bypass Gatekeeper checks. Here are two lures that cleverly download additional payloads and display a decoy PDF, all via

BlueNoroff has been actively targeting victims in the crypto space. On macOS, they've used Script Editor for initial access and now leveraging Automator to bypass Gatekeeper checks.

Here are two lures that cleverly download additional payloads and display a decoy PDF, all via
Validin (@validinllc) 's Twitter Profile Photo

Hot on the heels of the researched published by Huntress, hunting for Zoom-themed lures from DPRK's #BlueNoroff 💥Learn hunting techniques 💥Leverage new Validin features and data 💥Full, unredacted indicator list (domains, IPs, hashes) validin.com/blog/zooming_t…

Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

⏳ Just one week left to submit your talk to #OBTS v8 objectivebythesea.org/v8/cfp.html (CFP closes June 30th). We’ve expanded to 3 days of talks this year, making room for even more cutting-edge research +  first-time speakers. So submit your Apple security-themed proposal today!

Jeremy Boone (@uffeux) 's Twitter Profile Photo

Hello friends. Check out this awesome and unique role that just opened up on my team in SEAR. Wanna secure Apple silicon, ROMs, iBoot, and more? jobs.apple.com/en-us/details/…

Greg Lesnewich (@greglesnewich) 's Twitter Profile Photo

Fun crossover blog about TA829 (RomCom) & TransferLoader with my ecrime pals it’s got everything: 🛰️ Popped routers for sending phish 📊 ACH on attribution 👾 custom protocols 👽 cool malware 🕵️ crime 🎯 espionage ❔many unanswered questions proofpoint.com/us/blog/threat…

Moonlock Lab (@moonlock_lab) 's Twitter Profile Photo

🗞️ We couldn't fit our analysis of a new #AMOS #macOS #backdoor into a thread here, so we published a whole article! We appreciate SANS Institute, BleepingComputer, and others for sharing it! Give it a read! moonlock.com/amos-backdoor-…

Herbie Zimmerman (@herbiezimmerman) 's Twitter Profile Photo

The Huntress US SOC is looking for some analysts. So if anyone is looking for a role that can be challenging, has malware to play with, and the chance to learn and grow from some awesome people, then take a look at the roles here: lnkd.in/g2aN3hNk.

L0Psec (@l0psec) 's Twitter Profile Photo

Doing a Swift RE talk at #DEFCON33 Malware Village :) Never been to DEFCON before so I’m looking forward to meeting people! #DC33 #MalwareVillage

Doing a Swift RE talk at #DEFCON33 <a href="/MalwareVillage/">Malware Village</a> :)
Never been to DEFCON before so I’m looking forward to meeting people!  #DC33 #MalwareVillage
Objective-See Foundation (@objective_see) 's Twitter Profile Photo

📢 Just dropped: the full #OBTS v8 talk lineup! objectivebythesea.org/v8/talks.html And for the first time we'll have 3 full days of presentations! 🤩 Congrats to the selected speakers and mahalo to all who submitted. With ~100 submissions, selecting the final talks was a daunting task! 😫

mikey (@0xmachos) 's Twitter Profile Photo

[email protected] 🇺🇦 We were given a live demo of reversing a macOS malware sample and annotating the disassembly to make it all make sense by L0Psec using Vector 35’s Binary Ninja #OFTW

<a href="/kieczkowska/">kieczkowska@infosec.exchange 🇺🇦</a> We were given a live demo of reversing a macOS malware sample and annotating the disassembly to make it all make sense by <a href="/L0Psec/">L0Psec</a> using <a href="/vector35/">Vector 35</a>’s Binary Ninja #OFTW
Csaba Fitzl (@theevilbit) 's Twitter Profile Photo

🍎🐛macos 15.6 is out, a few new CVEs and mentions... NetAuth Impact: An app may be able to break out of its sandbox CVE-2025-43275 PackageKit Impact: An app may be able to bypass certain Privacy preferences CVE-2025-43232 CoreUtils We would like to acknowledge...