|
|
| user: | FireTroyan | | created: | 13 days ago | | karma: | 2 | | about: | Independent security researcher. 700h+ forensic analysis on Windows 11 supply chain compromise.
Firmware rootkits, bootkits, SMM persistence, cloud C2 via GCP. Reported to MSRC, 15 CERTs, EU. No response.Evidence: https://archive.org/detail
s/500ms-supply-chain-verification-toolkit NEW: Android Malware & Supply Chain Evidence — "Mark
Castillo" / MCD Technology Apps (Medellín) 5 trojanized APKs signed with same certificate. C2 via Tor,
exfiltration artifacts, lateral movement to IoT (Fire Stick, TV
Box).
Part of a 6-layer supply chain attack: firmware → boot →
SMM/kernel → OS → .NET → cloud. Google Cloud C2 infrastructure identified.
https://infosec.exchange/@supply_chain_research/116364420442613824 WARNING: Contains REAL malware. Handle in isolated
environments only.
MCO_plus_infected.zip
https://drive.proton.me/urls/0FDQF38VQW#YwuDfZbebG2uZIP password: infected | | submissions | | comments | | favorites |
|