Opens profile photo
Follow
Click to Follow sickcodes
Sick.Codes
@sickcodes
github.com/sickcodessick.codesJoined June 2020

Sick.Codes’s Tweets

Dear , considering that you won't allow me to renew my licence, I'd appreciate it if you either: a) Granted me an OSS dev license, considering the value I bring to your customers for free b) Refrained from using my work for PR purposes Cheers
Quote Tweet
#Gepetto keeps the first position for the second month in a row! Good job @JusticeRage 👏 Got a plugin that could be on the top of the chart? Publish it, and let’s see 🌐 plugins.hex-rays.com//?utm_source=S #IDAPlugin #PluginRoundup #IDAPro #IDAPython
Plugin Repository Monthly Roundup: April 2023
5
81
Medusa Team breached Alto Calore Servizi SpA which collects and distributes water for 125 municipalities in the province of Avellino and Benevento, Italy. Hacker warning to water users posted.
Image
17
DOJ detected SolarWinds hack i own network in summer of 2020 - 6 months before it was publicly exposed by Mandiant - but didn't know significance of what it found. Microsoft/Mandiant/SolarWinds all helped inv, but none could solve the mystery at the time
7
298
Today Lockbit ransomware group ransomed a day care center. When Lockbit ransomware group administration discovered the victim they issued an apology and claim to have fired the affiliate. "I am ashamed" - Lockbit administration
Image
30
1,240
This is a fucking doozy, it may be a contender for malware of the year - iCloud TOTP - Kills only its own PIDs - Access to everything incl Keychain - Bypasses TCC, PMAP, AMFI and a sandbox escape - XPC channel to avoid detection - Artifact Cleanup - No shared infra for domains
Quote Tweet
A threat group tracked by Microsoft as DEV-0196 is linked to an Israel-based private sector offensive actor (PSOA) known as QuaDream, which reportedly sells a suite of exploits, malware, and infra. Read our analysis in collaboration with @citizenlab: msft.it/6010gy5fA
2
279