Connecting RaaS, REvil, Kaseya and your security posture

Ransomware is an epidemic that adversely affects the lives of both individuals and large companies, where criminals demand payments to release infected digital assets.
In the wake of the ransomware success, Ransomware-as-a-Service (RaaS) is being offer… Continue reading Connecting RaaS, REvil, Kaseya and your security posture

#Solorigate : SUPERNOVA forensics using Code Property Graph

#Solorigate : SUPERNOVA forensics using Code Property Graph
The fallout of SolarWinds compromise has resulted in a bevy of new malware families, each with different characteristics and behaviors.
SolarWinds advisory : https://www.solarwinds.com/securit… Continue reading #Solorigate : SUPERNOVA forensics using Code Property Graph

A Month of Reckoning for SaaS software creators and consumers

An illustration of transitive and deeply connected software supply chains
The U.S. was caught off guard by foreign interference in the 2016 election. Given the powerful role of social media in political contests, understanding the Russian efforts was c… Continue reading A Month of Reckoning for SaaS software creators and consumers

SolarWinds SUNBRUST backdoor investigation using ShiftLeft’s Code Property Graph

If you’ve arrived to this post, I’d suggest reading the Part-1 and Part-2 to gain context.
FireEye released additional details here (on December 24th, 2020) that is well worth reading.
With the increase of complexity in software and the availability of… Continue reading SolarWinds SUNBRUST backdoor investigation using ShiftLeft’s Code Property Graph

SUNBURST SolarWinds BackDoor : Crime Scene Forensics Part 2 (continued)

SUNBURST SolarWinds BackDoor : Crime Scene Forensics Part 2 (continued)
First, let me be clear that I have no insider knowledge. This is my best guess at what occurred, based on publicly available information
If you’ve arrived to this post, I’d suggest… Continue reading SUNBURST SolarWinds BackDoor : Crime Scene Forensics Part 2 (continued)

Visual Notes : SolarWinds Supply Chain compromise using SUNBURST backdoor (detected by FireEye)

Visual Notes : SolarWinds Supply Chain compromise using SUNBURST backdoor (detected by FireEye)
First, let me be clear that I have no insider knowledge. This is my best guess at what occurred, based on publicly available information here (FireEye) and … Continue reading Visual Notes : SolarWinds Supply Chain compromise using SUNBURST backdoor (detected by FireEye)

Crane lifting Scala onto Code Property Graph to conduct vulnerability analysis

Image Courtesy : https://www.huismanequipment.com/
The Scala language has continued to gain popularity over the last several years, thanks to its excellent combination of functional and object-oriented software development principles, and its implement… Continue reading Crane lifting Scala onto Code Property Graph to conduct vulnerability analysis

An Oxymoron : Static Analysis of a Dynamic Language (Part 4)

An Oxymoron : Static Analysis of a Dynamic Language (Part 4)
Taint Flow challenges in a world of untyped and async event handling
From the previous post we concluded that type-checking at compile-time can help enforce better practices an… Continue reading An Oxymoron : Static Analysis of a Dynamic Language (Part 4)

An Oxymoron : Static Analysis of a Dynamic Language (Part 3)

An Oxymoron : Static Analysis of a Dynamic Language (Part 3)
TypeScript to the rescue
From the previous post we concluded that JavaScript contains a number of features that makes it a challenge to analyze and detect bugs in:

JavaSc… Continue reading An Oxymoron : Static Analysis of a Dynamic Language (Part 3)