Danny Moore
@moore.bsky.social
6.3K followers 280 following 250 posts
Cyber-warfare | PhD from KCL | Author of 'Offensive Cyber Operations' | Security @ Meta
Posts Media Videos Starter Packs
Pinned
moore.bsky.social
Since so many joined here, resharing that I have a book out called "Offensive Cyber Operations" that's been really well received and is a helpful all-round look at how different countries use offensive cyber!

www.amazon.com/Offensive-Cy...
www.amazon.com
moore.bsky.social
One of our biggest issues as a cybersecurity community and industry is that we inflicted dozens of partly overlapping cryptonyms on the world and just expect them to deal with it because we can't.
dannypalmer.bsky.social
A interesting read. Always felt a bit odd covering cyber attacks, then writing it was carried out by 'Vengeful Hamster' or 'Creeping Groundhog' or something

...then also having to use a paragraph to detail all the different names different companies call the same group.

www.wsj.com/tech/cyber-s...
‘We’re Not Naming Care Bears.’ Hacker Code Names Are Getting Too Cute
Cartoonish naming conventions for potentially catastrophic cyberattacks are dividing security professionals
www.wsj.com
moore.bsky.social
Still consistently the best cyber-related podcast out there
campuscodi.risky.biz
-CoinMarketCap hacked via animated logo
-White House rejects NSA & CyberCom nomination
-FCC probes US Cyber Trust Mark program
-Cyberattack disrupts Russian animal processing industry
-Iran hacks Albania's capital Tirana

Podcast: risky.biz/RBNEWS441/
Newsletter: news.risky.biz/risky-bullet...
moore.bsky.social
כנראה עדיין שוק תרמי כתוצאה מחימום מהיר על אינדוקציה
moore.bsky.social
Considering that one of Israel's overt goals for the war is to destabilize the Iranian government, a nation-wide shutdown of public internet access plays well into Israel's hands.

And it may not even stop further attacks.
lorenzofb.bsky.social
NEW: Iran's government has now admitted it took down the internet in the country, arguing it was to protect against Israeli cyberattacks.

I spoke to two Iranians who live abroad and can't communicate with their loved ones back home.

"I haven’t heard from them in two days," said @ammir.bsky.social.
Iran's government says it shut down internet to protect against cyberattacks | TechCrunch
The government cited the recent hacks on Bank Sepah and cryptocurrency exchange Nobite as reasons to shut down internet access to virtually all Iranians.
techcrunch.com
Reposted by Danny Moore
campuscodi.risky.biz
Predatory Sparrow has dumped the Nobitex crytpo platform source code on Telegram

They previously stole $90mil worth of assets in a hack yesterday

t.me/gonjeshkdara...
moore.bsky.social
My hot take is that it isn't a lack of strategy, Israel has many viable, ambitious strategies.

It's a constant failure of political will, unity, and patience to enact a strategy.
moore.bsky.social
Interesting! In my book, Offensive Cyber Operations, I talk a lot about the convergence of tactical offensive cyber and electronic warfare.

The resources, approach and desired outcomes are deeply connected.

The UK's move is in line with trends seen elsewhere. Will dive more into it all later.
shashj.bsky.social
1/ In run-up to SDR, UK has announced a new "Cyber and Electromagnetic Command". Temptation is to focus on offensive tasks. What MoD says is that it will "lead defensive cyber operations" for military networks and "coordinate" offensive ones with the National Cyber Force, which was set up in 2020.
moore.bsky.social
You could get away with a lot more back then, especially considering that the orgs/people who were targeted had next to nothing for endpoint and network security.
moore.bsky.social
The most interesting bit here is that the best Western gov cyber outfits overhauled their operational approach after the mid-10s to focus more on avoiding detection.

The era of the "factory ops" was too risky with the rise of threat intel.

Harder to reliably spot 2025's Regin, Careto, Flame, etc
lorenzofb.bsky.social
NEW: More than a decade ago, Kaspersky discovered a mysterious "elite" hacking group it called Careto (aka “The Mask”), which then vanished and only resurfaced last year.

We can now reveal that the researchers who investigated it were confident that the Spanish government was behind it.
Mysterious hacking group Careto was run by the Spanish government, sources say | TechCrunch
The elusive hacking group Careto was never publicly linked to a specific government, but TechCrunch has learned researchers concluded privately that the Spanish government was behind the group.
techcrunch.com
moore.bsky.social
"the technical team's analysis indicates that the attacker's methods and related technical proficiency were relatively low-level."

Nothing in the article to explain what makes this "cyber warfare".
campuscodi.risky.biz
A threat actor has allegedly breached and disrupted the backend systems of a sci-tech company based out of Guangzhou, China.

Chinese officials claimed the hack had a "clear political background and [showed] distinct signs of cyber warfare."

www.globaltimes.cn/page/202505/...
Reposted by Danny Moore
hultquist.bsky.social
If you’ve been laid off from a cyber intel position, please reach out if you’d like to come to @sleuthcon.bsky.social.
Reposted by Danny Moore
gregotto.bsky.social
NEW: Hundreds of victims are surfacing across the world from zero-day cyberattacks on SAP, in a campaign that one leading cyber expert is comparing to the vast Chinese government-linked Salt Typhoon and Volt Typhoon breaches. cyberscoop.com/sap-cyberatt...
SAP cyberattack widens, drawing Salt Typhoon and Volt Typhoon comparisons
Hundreds of victims are surfacing across the world from zero-day cyberattacks on Europe’s biggest software manufacturer and company.
cyberscoop.com
Reposted by Danny Moore
zey.bsky.social
Drama over at X/xAI.

Whatever you ask Grok, it pivots to “white genocide” in South Africa.

The last panel is what Grok claims was a “verbatim” system prompt that caused the behavior. Jury out.

It’s now fixed but they haven’t yet bothered explaining.

This, not those AGI fantastical scenarios.
Reposted by Danny Moore
josephcox.bsky.social
New from 404 Media: the Signal clone the Trump administration uses was just hacked. TeleMessage makes a modified version of Signal that archives messages for government agencies, Waltz used it. A hacker got some users' messages, group chats. Hugely significant breach www.404media.co/the-signal-c...
The Signal Clone the Trump Admin Uses Was Hacked
TeleMessage, a company that makes a modified version of Signal that archives messages for government agencies, was hacked.
www.404media.co
moore.bsky.social
Knowing Betz, he has been on a path leading to this for many years.
moore.bsky.social
The literal birth of my firstborn child was less anxiety inducing than a full week of driving and parking in Tel Aviv.
moore.bsky.social
New tech class, new vulnerability class
daviddlevine.com
LLMs hallucinating nonexistent software packages with plausible names leads to a new malware vulnerability: "slopsquatting."
LLMs can't stop making up software dependencies and sabotaging everything
: Hallucinated package names fuel 'slopsquatting'
www.theregister.com
Reposted by Danny Moore
raphae.li
THREAD: When @thekrebscycle.bsky.social and his workplace, @sentinelone.com, were singled out by Donald Trump on Wednesday, I thought it was an opportunity to weigh the cybersecurity industry's rhetoric against their real world actions.
moore.bsky.social
Cybersecurity is built on trust, I can only imagine how CISA staff must be feeling.
kevincollier.bsky.social
New: Current CISA employees — picture patriotic, hardworking nerds not used to the spotlight, often with narrow focuses like identifying how hackers break into the industrial control systems that run our water and electric facilities — are sick of Trump's cuts and the politicization of their work.
U.S. cyber defenders shaken by Trump's attack on their former boss
“Every day feels somehow more bizarre than the last. It is incredibly difficult to focus on our mission,” one current Cybersecurity and Infrastructure Security Agency employee said.
www.nbcnews.com
Reposted by Danny Moore
ericjgeller.com
👀 China reportedly acknowledged to outgoing Biden officials in December that it was responsible for the Volt Typhoon critical infrastructure intrusions, linking them to "increasing U.S. policy support for Taiwan." www.wsj.com/politics/nat...
Reposted by Danny Moore
k8em0.bsky.social
I was there. It was meant literally.

“JD Work — now on the US NSC — shocked some by warning that the US would take lethal action against malicious actors in commercial cyber operations.
Participants who heard [it said] they were unsure if it was meant literally or figuratively”
Reposted by Danny Moore
rikefranke.bsky.social
The Swiss population doesn’t want to buy the F35 anymore, given everything that’s going on in Trump’s US.
In 2020, a 50,1% majority had voted for the acquisition in a referendum.

www.watson.ch/schweiz/wirt...
Reposted by Danny Moore
kimzetter.bsky.social
Why is the headline on all X outage stories about Musk blaming Ukraine for the DDoS? Why aren't media outlets putting the emphasis on the security lapse that allowed script kiddies (or whoever) to launch the attack against X as well as the lack of any evidence that the traffic came from Ukraine IPs?
moore.bsky.social
DDoS attacks frequently use compromised or otherwise co-opted IP addresses. The global distribution helps avoid geofencing defenses.

Public high-confidence attribution takes time and effort. So take any quickfire claims with healthy skepticism.
kevincollier.bsky.social
Updated with Musk's claim about the apparent DDoS: The IP addresses originated in "the Ukraine area."

Besides the geographical ambiguity (isn't Russia in the Ukraine area?), this is also total nonsense. A big DDoS uses hacked devices from around the world. Says nothing about where the attacker is.
X sees major outages as Musk claims 'massive cyberattack' hit platform
Three separate outages appear to have hit the social media site Monday.
www.nbcnews.com
moore.bsky.social
מסכים לגמרי, האמירות האלו מתעלמות מהמגבלות האינהרנטיות של LLMs. יש הבדל בין עיבוד וניסוח תוכן מורכב לבין חשיבה יוצרת