Matt Johansen
@mattjay.com
9.9K followers 480 following 810 posts
Friendly neighborhood cybersecurity guy | expect infosec news, appsec, cloud, dfir. | Long Island elder emo in ATX. vulnu.com <- sign up for my weekly cybersecurity newsletter
Posts Media Videos Starter Packs
mattjay.com
Funnily enough, I was looking for Medusa stuff while writing this thread, and CISA's advisory on how to protect yourself from them is the top search result.

While this is all good advice, it wouldn't have done much to stop this type of attack.

Hacks are just logins in 2025.
mattjay.com
Worth noting actors maintained professional demeanor throughout most interactions. Only escalated to aggressive tactics (MFA bombing) after patience wore thin.

Even apologized and said that was just them testing the login page.
mattjay.com
Group referenced previous "successful" insider compromises at UK healthcare and US emergency services orgs.

Claims align with known Medusa TTPs focusing on high-value targets.
mattjay.com
When reporter delayed, group pivoted to aggressive MFA bombing - continuously triggering 2FA notifications hoping for accidental approval. Same technique used in 2022 Uber compromise.
mattjay.com
They requested specific network reconnaissance via command line queries, demonstrated knowledge of BBC's IT infrastructure, and offered "trust payment" of 0.5 BTC as deposit.
mattjay.com
Threat actor claimed to be a "reach out manager" for Medusa - a Ransomware-as-a-Service operation believed to operate from Russia/CIS region.

Group has hit 300+ victims in past 4 years per US cyber authorities.

(img: TheHackerNews)
mattjay.com
Initial contact came to @JoeTidy via Signal from "Syndicate" offering 15% of potential ransom payment for access to BBC systems.

Offer later increased to 25% of what they claimed would be "1% of BBC's total revenue."
mattjay.com
This BBC reporter was offered 25% of a ransom payout if he gave hackers access to the corporate network.

He played along so we got a look inside their tactic here:
mattjay.com
I think the separation of dev and prod is one of the most important things we need to solve in AI coding land.

Keys. Secrets. Deployment. All that jazz.

None of the tools help, if anything they make it super easy to do wrong.
mattjay.com
Panel on bootstrapping vs. VC money.

@haroonmeer.canary.love : “With bootstrapping you need to be careful to not be timid when it’s time to be bold”

Just great life advice in general. Will remember this quote forever.

Oh and @hdm.io and @andrewmorr.is are cool too.
mattjay.com
Not just 4chan trolls. 404media decompiled the app and found the URLs in question in code. Not public anymore, but verified they are there.

Original article: www.404media.co/wome...
mattjay.com
"No authentication, no nothing. It's a public bucket"

This is why security and privacy pros hate these ID verification laws that require drivers license uploads - these apps just can't keep this stuff secure.
mattjay.com
They found the database exposed on Google's Firebase.

The app is meant to be basically the "are we dating the same man?" Facebook group in a dating app.

In order to verify that the users are women, they ask for photos and driver's licenses.
mattjay.com
That viral women's only dating app 'Tea' was hacked by some 4chan users.

They didn't phish, social engineer, or use some crazy hacker technique either - the database was just public
mattjay.com
Hey so… don’t do this.
mattjay.com
Someone can buy this extension that is tied to tons of peole's salesforce account and just ...get access to all that info. (h/t @johntuckner.me)
mattjay.com
If I was a bad guy who was looking for memory vulns, I'd be ALL OVER these new hotness web browsers. (Comet, Arc, etc.)

Market share is small but much more valuable targets. - Teams behind them way smaller than ...Google
mattjay.com
Wild trend this week of legitimate apps and extensions turning into malware.

youtu.be/o9XBXeX0_5E
mattjay.com
I just can't believe how successful ClickFix campaigns are right now.

And now FileFix on top of it...
mattjay.com
Which Windows drivers keep Microsoft’s security engineers busiest - and which ones do attackers actually exploit?

Artem Baranov did the dang math.

He scraped every CVE bulletin from Jan 2022 through May 2025 and built a clean data set of kernel-mode driver patches.