X-Force Profile Banner
X-Force Profile
X-Force

@XForce

2,612
Followers
230
Following
20
Media
236
Statuses

IBM X-Force

Joined January 2023
Don't wanna be here? Send us removal request.
@XForce
X-Force
2 months
Congratulations to Chompie who scored a win in the Windows 11 LPE category! Her exploit circumvents the latest Virtualization Based Security mitigations. She becomes the first solo female competitor to score a full win at #Pwn2Own , the world’s most prestigious hacking competition
@thezdi
Zero Day Initiative
2 months
Confirmed! Valentina Palmiotti ( @chompie1337 ) with IBM X-Force used an Improper Update of Reference Count bug to escalate privileges on Windows 11. She nailed her first #Pwn2Own event and walks away with $15,000 and 3 Master of Pwn points.
Tweet media one
56
75
653
11
74
542
@XForce
X-Force
7 months
The @xforce team is increasing our public reporting from IR, Red, & Threat Intel. This year we’ve covered custom C2 capabilities from XF Red & APTs, plus findings from a global cred harvesting campaign. Follow @XForce to keep up with our latest research.
3
11
53
@XForce
X-Force
8 months
Here's our latest blog "Critically Close to Zero(Day): Exploiting Microsoft Kernel Streaming Service". Follow along as @chompie1337 walks us through her process of exploring an attack surface, finding a 0day, and building an exploit.
1
17
39
@XForce
X-Force
1 year
Check out @FuzzySec 's recent blog "Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers".
0
23
39
@XForce
X-Force
10 months
The average cost of a data breach has reached an all-time high of $4.45 million per incident. Explore the Cost of a Data Breach Report that unpacks the rising costs, along with recommendations to upgrade your #cybersecurity strategy and minimize losses:
1
14
31
@XForce
X-Force
1 year
Our 2023 Threat Intelligence Index is live! It is packed full of analysis, observations, and statistics from across the X-Force team.
1
15
31
@XForce
X-Force
8 months
We have X-Force internship positions opening up for 2024! Incident Response Red Threat Intel - Malware Reverse Engineer
1
18
28
@XForce
X-Force
3 months
“Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits for Post-Exploitation” awesome talk from @FuzzySec and @chompie1337
@chompie1337
chompie
3 months
Rootkits, keyloggers, and DKOM (oh my!). The video is finally up for @FuzzySec and I’s BlackHat talk: Close encounters of the advanced persistent kind: Leveraging rootkits for post-exploitation. Check it out ☺️
4
117
315
0
2
29
@XForce
X-Force
1 year
Check out our latest blog “Dissecting and Exploiting TCP/IP RCE Vulnerability “EvilESP”” by @chompie1337 . Learn how she reverse engineered the patch for CVE-2022-34718 and wrote a remote Denial of Service exploit!
1
13
29
@XForce
X-Force
9 months
Our 2023 Cloud Threat Landscape Report is out now! "Making up nearly 90% of assets for sale on dark web marketplaces, credentials’ popularity among cybercriminals is apparent, averaging $10 per listing — or the equivalent of a dozen doughnuts."
1
9
25
@XForce
X-Force
1 year
“The thing that strikes me is that security should be baked into everything we do, not a paid-for service, it should be on by default.” @angus_tx
0
8
23
@XForce
X-Force
8 months
Check out this awesome blog from one of X-Force Red's interns. They get to work with an amazing team of hackers during their internships and their research always leads to great stuff!
@d_tranman
Dylan Tran
8 months
Dug into call stacks spoofing for the past few months and wrote something. Hopefully this is helpful.
9
111
311
1
4
21
@XForce
X-Force
1 year
Can someone do a wellness check on @Grifter801 ? 1989 was a long time ago and we have concerns.
@Grifter801
Grifter
1 year
I brought a sealed box of Batman cereal from 1989 to @ShmooCon and just after midnight…we feasted! #shmoocon #itseemedlikeagoodideaatthetime @dakacki @d0rkph0enix @lintile @jaybeale @d4rkm4tter
Tweet media one
Tweet media two
25
19
206
0
4
21
@XForce
X-Force
1 year
We are proud of our team for their accomplishments both on and off the keyboard. Thanks @Evil_Mog for your leadership in the infosec community.
@Evil_Mog
EvilMog
1 year
@laurenancona I'm the Chief Architect of @XForce , Autistic and ADHD. I am wildly successful. You can do it.
3
8
67
0
3
17
@XForce
X-Force
10 months
Come hack with us today and grab a t-shirt!
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
1
16
@XForce
X-Force
7 months
ICYMI - we’re tracking AI-enabled threats and testing their efficacy compared to human operations. Check out the results of our phishing tests.
0
3
15
@XForce
X-Force
7 months
Bumping this for the threat hunters starting their day looking for some new techniques to explore. We track the activity as Hive0051. You might track the group as Gamaredon. Happy hunting!
@XForce
X-Force
7 months
Check out our latest report, “Hive0051’s large scale malicious operations enabled by synchronized multi-channel DNS fluxing.”
0
8
40
1
7
15
@XForce
X-Force
3 months
Opportunity to join @XForce and work with a great group of hackers, researchers, and responders!
@retBandit
Chris Thompson
3 months
Come hack with us! I am hiring for operators for our Managed Red Teaming practice. This role delivers "continuous" monthly red team services for clients to a "Targeted" sophistication level, helping them mature their security program on a more frequent basis then our ad-hoc, more
4
43
108
1
2
15
@XForce
X-Force
10 months
We're excited to see everyone next week for Hacker Summer Camp! The X-Force team is showing up in force at booth #1132 . We'll have demos for hacking, IR, and threat intel. Plus a whole bunch more - talks, swag, cyber range demo, @spacerog book signing, and a mix of shenanigans.
0
8
14
@XForce
X-Force
8 months
X-Force IR is hiring for a Principal Incident Response Consultant in Canada. Candidates must possess a Canadian Secret-level clearance or be able to obtain it within one year of employment. Details here:
0
6
12
@XForce
X-Force
1 year
Congrats @Evil_Mog ! This is an awesome recognition of your contributions and very well deserved.
@Evil_Mog
EvilMog
1 year
Just got my queens platinum Jubilee medal (on the right), awarded by @ThomasDangAB up in Edmonton. Pictured next to my general service medal (SWA).
Tweet media one
4
3
44
0
4
13
@XForce
X-Force
1 year
It’s awesome to see our X-Force team getting recognized at @IBM Tech 2023 for their amazing contributions.
@_sn0ww
Snow
1 year
This week I was honored to be invited, along with 1,200 other @IBM -ers, to IBM Tech 2023. It was inspiring to learn about innovations we're working on, network with folks from around the world, hear from our CEO @ArvindKrishna , and connect with members from my team @XForce
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
3
22
0
2
13
@XForce
X-Force
10 months
Tweet media one
0
2
12
@XForce
X-Force
10 months
It has been an awesome week showcasing the amazing work of the @xforce teams this week at @BlackHatEvents
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
2
12
@XForce
X-Force
1 year
Make sure you come see the team at RSA and get your book signed by @spacerog !
@spacerog
Space Rogue
1 year
I will be signing my book "Space Rogue: How the Hackers Known As L0pht Changed the World" at the IBM booth at RSA. Come by and say Hi! @IBMSecurity @XForce @xforcered @XForceIR
Tweet media one
2
6
22
0
6
10
@XForce
X-Force
8 months
Are you attending @MSFTBlueHat con this week? Check out @Evil_Mog 's talk "NTLMv1 was broken a long time ago, why are we still seeing it?" on Thursday!
1
2
10
@XForce
X-Force
1 year
Our latest blog "X-Force Prevents Zero Day from Going Anywhere" by @TactiKoolSec Quick look: initial access was obtained through exploitation of CVE-2023-0669 (Go AnyWhere MFT) a day after the release of the vuln & 4 days before a patch was released
Tweet media one
0
2
9
@XForce
X-Force
1 year
"Self-Checkout This Discord C2" - Check out our research into point-of-sale malware leveraging Discord for C2. Did we mention a Raspberry Pi was leveraged too? More details here:
0
6
8
@XForce
X-Force
10 months
Come see @spacerog at the X-Force booth and get a signed copy of his book! 11-12 today at booth 1132
Tweet media one
0
1
9
@XForce
X-Force
6 months
Join the @XForce team for some behind-the-scenes conversations on December 12th
Tweet media one
0
2
9
@XForce
X-Force
11 months
@realcyberpanda
Cyber Panda 🐼
11 months
Real hackers use ThinkPad. The old ones! 💻🔓
Tweet media one
168
250
2K
1
0
7
@XForce
X-Force
3 months
Check out our latest research, "Widespread exploitation of recently disclosed Ivanti vulnerabilities", discussing the activity we've associated with CVE-2023-46805 and CVE-2024-21887.
0
3
7
@XForce
X-Force
5 months
New activity in this ITG05 (APT28) campaign: 20231113_ROU_ROAD_MOV_REQUESTNATOTF20231113NN001- 302[.]zip --> 20231113_ROU_ROAD_MOV_REQUESTNATOTF20231113NN001- 302[.]pdf Domain documents-cloud[.]infinityfreeapp[.]com phish URL /filewdn[.]php Headlace C2 /execwdn[.]php
@XForce
X-Force
6 months
"ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware" ITG05 overlaps with APT28, UAC-028, Fancy Bear, and Forest Blizzard.
1
14
20
1
1
9
@XForce
X-Force
4 months
If you’re attending the @sansforensics #CTISummit this week, our Global Head of Threat Intelligence, @klrgrz , is speaking today at 410 ET! The SANS CTI Summit is free to attend virtually
0
2
7
@XForce
X-Force
10 months
The report is full of great charts and graphics too, like this one: Cost and frequency of a data breach by initial attack vector
Tweet media one
0
2
6
@XForce
X-Force
1 year
53 47 56 73 62 47 38 73 49 48 64 76 63 6d 78 6b 49 51 3d 3d
5
1
6
@XForce
X-Force
9 months
X-Force has observed nearly two dozen email campaigns since late June leveraging the updated DBatLoader loader to deliver payloads such as Remcos, Warzone, Formbook, and AgentTesla.
0
2
6
@XForce
X-Force
1 year
Thanks @DecipherSec for having Kat on the podcast today to talk about our recent BlackCat Ransomware report!
1
1
4
@XForce
X-Force
10 months
Come see @spacerog at the @xforce booth and get a signed copy of his book!
Tweet media one
0
1
6
@XForce
X-Force
3 months
"Threat Intelligence is a Fallacy, But I May Be Biased" by @klrgrz is now available on YouTube
@XForce
X-Force
4 months
If you’re attending the @sansforensics #CTISummit this week, our Global Head of Threat Intelligence, @klrgrz , is speaking today at 410 ET! The SANS CTI Summit is free to attend virtually
0
2
7
0
2
6
@XForce
X-Force
1 year
Awesome work @knavesec and @ZephrFish !
@knavesec
Ellis Springe
1 year
CredMaster 2.0 passspray tool release! New features like notification alerts, advanced SOC evasion techniques, 8 new plugins and an easy config file. S/O to @ZephrFish for all his contributions in the rewrite B: G:
Tweet media one
Tweet media two
Tweet media three
10
148
404
0
2
6
@XForce
X-Force
5 months
We're hiring a dark web threat analyst in Medellin, Colombia!
0
3
6
@XForce
X-Force
1 year
“We’re not going to legislate our way into ‘secure’ – this takes a public-private partnership and a commitment to long-term security,” @angus_tx said during a tour of the IBM X-Force centre in Boston on Tuesday.
0
2
6
@XForce
X-Force
1 year
Awesome group of reports on #RaspberryRobin #malware including our research via
@BushidoToken
Will
1 year
@MethodsDigital I recommend giving some recent reporting a review and making some changes... Oh and cite & link your sources plz
0
4
10
0
2
6
@XForce
X-Force
9 months
"Despite a concerted global effort to disrupt Russian cybercriminal activity through sanctions and indictments, gangs like Trickbot continue to thrive. “Less has changed than meets the eye,” says @OleVilladsen , a senior analyst at IBM’s X-Force..."
0
1
5
@XForce
X-Force
1 year
With a demo video!
@chompie1337
chompie
2 years
Remotely exploiting CVE-2022-34718, TCP/IP RCE bug #EvilEsp for DoS. This is a bug in Ipv6 fragmentation/IpSec, which allows OOB write if an Ipv6 fragment is contained inside an IpSec ESP payload.
55
520
3K
0
2
5
@XForce
X-Force
6 months
Listen to the latest @DecipherSec episode to hear about our recent GootLoader research into the GootBot implant.
0
1
4
@XForce
X-Force
5 months
If you’re at @shmoocon this weekend, @Evil_Mog is presenting at 3 in Belay It! and @klrgrz is presenting at 3 in Bring It On! on Saturday.
0
3
4
@XForce
X-Force
10 months
Look at these goons!
@_vertighost
John Hendley
10 months
A week in Vegas is a long time, but the community is second to none. Proud of all the folks at @XForce for our phenomenal showing at BlackHat. And huge shout out to all the goons at DEF CON; this was my first year volunteering, and I already can’t wait for next year. Later Vegas!
Tweet media one
0
2
20
0
1
5
@XForce
X-Force
5 months
Our very own @TactiKoolSec sat down with @helpnetsecurity to discuss 2024 cybersecurity trends and expectations:
0
0
5
@XForce
X-Force
1 year
Come see @_videoman_ at the @IBMSecurity booth and get some fun hands on experience cloning cards. Starting now!
Tweet media one
0
2
5
@XForce
X-Force
1 year
Who let the hackers into that place? 👀
@angus_tx
Charles Henderson
1 year
Balloons not on the docket… yet
Tweet media one
0
1
20
0
0
4
@XForce
X-Force
5 months
Awesome work @greglesnewich and thanks for the shout out for our research!
@greglesnewich
Greg Lesnewich
5 months
actual account is @XForce and here's a link to actual rule - no yelling at me its a Monday after all
0
4
18
0
0
4
@XForce
X-Force
3 months
"Ongoing ITG05 operations leverage evolving malware arsenal in global campaigns" ITG05 is a Russian state-sponsored group consisting of multiple activity clusters and shares overlap with APT28, UAC-028, Fancy Bear, and Forest Blizzard.
0
4
4
@XForce
X-Force
1 year
There are a lot of interesting angles to consider when it comes to the new gTLDs. Check out @_sn0ww ’s awesome thread on some of the security concerns and how she can use the new .zip gTLD to phish users during security testing.
@_sn0ww
Snow
1 year
I’ve seen a lot of concern around the new .zip gTLD. Let’s look a little deeper into what this means, from my (attacker) perspective. Thread 🧵
7
84
330
0
1
4
@XForce
X-Force
5 months
Check out @FuzzySec ’s @SANSInstitute HackFest talk “(Ab)using the Microsoft Identity Platform: Exploring Azure AD Token Caching”
@FuzzySec
b33f | 🇺🇦✊
5 months
The recording for the talk I did at SANS HackFest is online: (Ab)using the Microsoft Identity Platform: Exploring Azure AD Token Caching I want to thank @Steph3nSims for the invitation and putting on such an excellent event 🙇‍♂️
5
75
211
0
1
4
@XForce
X-Force
1 year
Make sure you swing by the @IBMSecurity booth at #RSAC2023 for a signed copy of @spacerog ’s book!
@spacerog
Space Rogue
1 year
I don’t know if they ordered enough, lol!
Tweet media one
2
0
29
0
0
4
@XForce
X-Force
9 months
Our Head of Threat Intelligence, @klrgrz , is hosting a webinar next week to talk through the report with the team. Get registered today! Cloud Threat Landscape Report: Explore Trends to Stay Ahead of Threats Wed, Sep 20, 2023 11:00 AM EDT
0
1
4
@XForce
X-Force
1 year
Check out @TactiKoolSec dropping some knowledge
@KyleAlspach
Kyle Alspach
1 year
Another sign that cyber defense is making strides vs. ransomware - @IBMSecurity reports way more attacks were stopped prior to ransomware deployment last yr:
2
15
20
0
0
4
@XForce
X-Force
1 year
Are you a student located in Costa Rica and looking for an offensive security internship? X-Force Red has openings now! #pentesting #internship #xforcered You can read more and apply here:
0
0
3
@XForce
X-Force
5 months
Don’t miss the opportunity to see our Global Head of Threat Intelligence, @klrgrz , at the @sansforensics #CTISummit next month!
@sansforensics
SANS DFIR
5 months
📣 Don't miss this upcoming #CTISummit talk! 🎤 #ThreatIntelligence is a Fallacy, But I May Be Biased 👥 @klrgrz , Global Head of Threat Intelligence, IBM X-Force Join us on Jan 29-30 in Washington, DC, or Live Online. ➡️ View Agenda & Register: #CTI
Tweet media one
0
1
8
0
0
3
@XForce
X-Force
1 year
Check out @john__hendley 's conversation with @thetomzone from @ITBrew about our 2023 Threat Intelligence Index.
@_vertighost
John Hendley
1 year
Had a great conversation recently with @thetomzone from @ITBrew about The 2023 X-Force Threat Intelligence Index. Spoiler alert: don't hang the 'Mission Accomplished' banners yet.
0
4
9
0
0
3
@XForce
X-Force
10 months
Someone say @klrgrz hugs? Bet.
@klrgrz
☠️ Andy Piazza ☠️
10 months
I’ll be at our booth with quite a few folks from our intel teams. Plus I’ll have klrgrz stickers! Come by and say hi, grab a sticker, and a bear hug or fist bump!
2
1
14
1
1
3
@XForce
X-Force
1 year
We are really excited about this collaboration between @xforce Threat Intelligence and @RedHat to deliver malware detection capabilities to their Insights customers. More info here:
0
2
3
@XForce
X-Force
10 months
Swing by our booth, 1132, to meet the @xforce team, hack some stuff with us, and get a tshirt!
0
1
3
@XForce
X-Force
9 months
New Hive0117 phishing campaign imitates conscription summons to deliver DarkWatchman malware directed at individuals associated with major energy, finance, transport, and software security industries based in Russia, Kazakhstan, Latvia, and Estonia.
0
4
3