Andrew 🌻 Brandt πŸ‡

Words published here do not necessarily reflect views of my employer or any other organization I am affiliated with.

Research and analysis about malware, network forensics, and the intersection of crime with anything that electrons or photons flow through.

Board member of World Cyber Health, the parent organization behind Malware Village and the NO-HAVOC project.

Docent of obsolete technology at @mediaarchaeologylab

Executive director, Elect More Hackers: electmorehackers.com

"By reading this, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies ("BOGUS AGREEMENTS") that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges." -- Cory Doctorow

Backup tooter
@threatresearch.bsky.social
Threat level
mostly harmless
Andrew 🌻 Brandt πŸ‡ boosted:
2026-01-29

A new Android malware campaign is using the Hugging Face platform as a repository for thousands of variations of an APK payload that collects credentials for popular financial and payment services.

bleepingcomputer.com/news/secu

Andrew 🌻 Brandt πŸ‡ boosted:
2026-01-29
Andrew 🌻 Brandt πŸ‡ boosted:
2026-01-29
A white dishtowel with an embroidered panel. It features a row of coral flowers and some blue bunting. The message reads: "AI SHOULD DO DISHES."
Andrew 🌻 Brandt πŸ‡threatresearch@infosec.exchange
2026-01-24

@davidgerard Maybe he could just become a RAM vendor to every other industry, since he apparently felt the need to buy every single goddamn wafer in existence in advance, before it was even produced.

Andrew 🌻 Brandt πŸ‡threatresearch@infosec.exchange
2026-01-22

@harrymccracken Second nomination for Steve Wozniak, but also for whichever exec at Commodore convinced engineering to let their dog's footprint be on the interior of the upper case mold for the Amiga, with all the other exec's signatures. Absolute legend.

Andrew 🌻 Brandt πŸ‡ boosted:
2026-01-22

Launching their new social network, W, a group in the EU posted a map of where other social networks are hosted. It showed nothing in Europe.

But their map is wrong.

Here's what Mastodon actually looks like, and what the Fediverse as a whole actually looks like.

arewedecentralizedyet.online/m

A screenshot of a map showing that Mastodon instances are located around the world.A screenshot of a map showing that many kinds of Fediverse instances are located around the world.
Andrew 🌻 Brandt πŸ‡ boosted:

@thetnholler.bsky.social

I can't say it better than this:

"I have given this offer more consideration than it is due already. Now, fuck off. Then keep fucking off. Fuck off until you come up to a gate with a sign saying β€˜You Can’t Fuck Off Past Here.’ Climb over the gate, dream the impossible dream, and keep fucking off forever."

Cory Doctorow (@pluralistic), Attack Surface (Little Brother, #3)

Andrew 🌻 Brandt πŸ‡ boosted:
2026-01-19

#Mozilla wants to know what you want from them and, in particular, #Firefox.

Let.

Them.

Know.

mozillafoundation.tfaforms.net

Andrew 🌻 Brandt πŸ‡threatresearch@infosec.exchange
2026-01-12

@north
Counterpoint:

ActivityPub binhex over morse code, transmitted on HF frequencies during solar storms for increased range

Andrew 🌻 Brandt πŸ‡threatresearch@infosec.exchange
2026-01-12

@PhineasX 伝θͺ¬ηš„ !

Andrew 🌻 Brandt πŸ‡threatresearch@infosec.exchange
2026-01-12

@atomicpoet Dang, and here I thought it was going to be a beer brewing sim!

Andrew 🌻 Brandt πŸ‡ boosted:
PACES Vancouvernoschoolai
2026-01-12

Vancouver School Board are planning to deploy Microsoft Copilot in classrooms.

We are collecting signatures to show VSB that we are concerned about the effect on our children, and do not consent.

If you are concerned about AI being used in classrooms, please sign and share this petition.

actionnetwork.org/petitions/vo

Andrew 🌻 Brandt πŸ‡threatresearch@infosec.exchange
2026-01-12

I just signed a petition put out by @noschoolai, run by parents whose children attend the Vancouver school district in Vancouver, BC, Canada.

Their school board, the VSB, has decided to deploy the Microsoft Copilot generative AI tool to the district. These parents oppose the use of Gen AI chatbots in schools, and have organized a petition drive to signal to the school board that the wider community does not agree with this deployment.

Here is what I wrote in my petition comment:

While neither a resident of the region or a parent of a student in this school, I am a tech policy expert and advisor on the use of generative AI in K-12 education.

I strongly discourage the VSB from deploying this technology until and unless they understand the educational purpose of the deployment, and have already passed and enacted appropriate districtwide policies governing the boundaries of how, when, and who are allowed to use it, and for what purpose, sought feedback from the wider community, and fully understand and have explained to the public what are the privacy, data security, and abuse/exploitation risks you are willing to tolerate in order to subject students and staff in the district to this technology.

If you cannot explain the fundamental educational purpose of this project, the limits you place on its use, and a risk model for what happens when use falls outside of these parameters, under no circumstances do you have any business deploying or using generative AI in any schools.

noai.school/vsb-petition/

#EdTech #SchoolBoard #TechPolicy

Andrew 🌻 Brandt πŸ‡ boosted:
2026-01-12

I'm having trouble with the UK #PostOffice customs form entry today. Whatever HS code I try to type in by number, it only ever offers this 8211 - which appears to be for table knives. I wanted circuit boards.

Type a description of what you're sending

Customs code (HS tariff no.)

[ box where I entered 8537.10 ]

Please select:

Tools, implements, cutlery, spoons and forks, of base metal; parts thereof of base metal: Knives with cutting blades, serrated or not (including pruning knives), other than knives of heading 82.08, and blades therefor.: Other: Table knives having fixed blades(8211.91.00)
Andrew 🌻 Brandt πŸ‡ boosted:
2026-01-12

Well, here's a new accursed UI pattern. When you try to book a flight on Chase rewards and key in the exact code for the airport you want to go to, it suggests a bunch of non-matching airports, and puts the exact match like 10 options down.

A drop-down menu from the Chase website. I have keyed in "LHR" and the menu has dropped down a menu with the options "LXA," "LHW" and "LHE."
Andrew 🌻 Brandt πŸ‡threatresearch@infosec.exchange
2026-01-12

@danielkennedy74 Are they "securi-splainers?"

Andrew 🌻 Brandt πŸ‡threatresearch@infosec.exchange
2026-01-12

@thedarktangent @adamshostack came here to say exactly this. Well played, Adam!πŸ˜‚

Andrew 🌻 Brandt πŸ‡ boosted:
2026-01-12

The UK government is to enforce a law this week which will make it a criminal offence to create non-consensual intimate images and make a new law to make tools to create non-consensual intimate images illegal bbc.co.uk/news/articles/cq845g

Andrew 🌻 Brandt πŸ‡threatresearch@infosec.exchange
2026-01-12

I had a chance last week to chat with Benjamin Read of #Wiz. Last month, Read and other members of his team published a deep dive into the #React2Shell
(CVE-2025-55182) vulnerability, and I was curious to see what has been hitting my honeypot, so I took a closer look.

This is doing some weird stuff, friends.

As is normally the case with exploits targeting internet-facing devices, once the exploit becomes known, it ends up in the automated scanners used by threat actors and security researchers. What I've seen over the past week is a combination of both.

In just a few hours of operation, I identified a small number of source IP addresses exploiting React2Shell by pointing the vulnerable system at URLs hosting BASH scripts. These scripts are really familiar to anyone who routinely looks at honeypot data - they contain a series of commands that pull down and execute malicious payloads.

And as I've seen in the past, some of these payloads use racially inflammatory language in their malware. It's weird and gross, but unfortunately, really common.

But while most of these payloads were "the usual suspects" - remote shells, cryptocurrency miners - there was one payload that stuck out.

It's an exploit file, based on this proof-of-concept [github.com/iotwar/FIVEM-POC/bl] designed to DDoS a modded server running "FiveM," a popular version of the game Grand Theft Auto V.

Let that one sink in: among the earliest adopters of a brand new exploit are...people trying to mess with other people's online game servers.

I've long said that exploits like these are the canaries in the datacenter coal mine. After all, if an attacker can force your server to run a cryptominer (or a game DDoS tool), they can force it to run far more malicious code.

I guess someone, or a group of someones, just want to ruin everyone's good time, no matter how or what form that takes. And they'll do it in the most offensive way possible.

Anyway, patch your servers, please, if only to stick it to these people who want to be the reason we can't have nice things.

#PoC #exploit #CVE_2025_55182 #DDoS #FiveM #REACT #Bash #cryptominer #malware

User-Agents employed both by researchers and threat actors attempting to exploit React2Shell on a honeypotSome of the malware contains Bash script commands and filenames with racially offensive slurs. These are not nice people.What a sample React2Shell exploit command looks like - a lot like Mirai and other automated wormsIn just a few hours, these four IP addresses tried to infect my honeypot dozens of times.
Andrew 🌻 Brandt πŸ‡ boosted:
2026-01-12

OFCOM have opened a formal investigation into X.

They may fine X 10% of its global revenue, require all advertisers to withdraw as an X client, and require UK internet providers to block X. ofcom.org.uk/online-safety/ill

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst