
Simon Scannell
@scannell_simon
Cloud Vulnerability Research @ google. Opinions are my own
ID: 1055055857455632384
https://scannell.io 24-10-2018 11:18:13
195 Tweet
2,2K Followers
486 Following






Another Google Cloud service (Cloud Run) is abused by #Astaroth, #Mekotio & #Ousaban banking trojans. The campaign was targeting Italian-speaking victims. Delphi malware is not fun to reverse 😂 but working with b4n1shed, Guilherme Venere, Holger Unterbrink was great 🎉blog.talosintelligence.com/google-cloud-r…



Very excited to present this with Anthony Weems! See you in Berlin! (Ezequiel Pereira and 那个火饺🦆(JJ)) were also working on that project and will also be there :)



Excited to share this blog post about server-side memory corruption that my team exploited in production. Shout-out to Simon Scannell, Ezequiel Pereira, and 那个饺子🦆(JJ) - this was a very fun project. :-) bughunters.google.com/blog/622075742…


Learn how Google CVR could have potentially exfiltrated Gemini 1.0 Pro before launch last year. We describe the vulnz, the fix, and tips for bughunters. Also, shout-out to Ezequiel Pereira for teaming up to adapt this work to another cloud provider. bughunters.google.com/blog/567986357…


Sharing rsync instances vulnerable to CVE-2024-12084 RCE (version check only) in our updated daily Accessible Rsync report: shadowserver.org/what-we-do/net… 17,475 instances found vulnerable (out of population of 146,844) on 2025-01-16. Top affected: US (5K) dashboard.shadowserver.org/statistics/com…



🌪️ Speaker Announcement! Excited to welcome Simon Scannell to the #TyphoonCon2025 Conference lineup! Join us in Seoul on May 29-30! 🔗typhooncon.com/agenda
