Published: August 30, 2025
7
12
83

Isn't it extremely dubious for a security company to run real exploits against systems they don't own? Bitsight is running Citrix exploits which, if the exploit succeeds, can produce a memory leak containing e.g. system credentials Just casually engaging in cybercrime

Image in tweet by Simo

@SimoKohonen I think it depends on funding and how many Agencies subscribe to their services. Not condoning but testing acceptable limits and definitions of "Crime"? 3rd party risk, 1st party advantages.

@osgo Indeed, with the right buddies you can afford to be more adventurous πŸ˜‚

@SimoKohonen Depends, if the exploit is doing like 1 byte leak, no issue but if it's dumping more than a couple of bites then it's a crime in many jurisdictions.

@hackerfantastic Some examples

Image in tweet by Simo

@SimoKohonen Can't agree more with you.

@SimoKohonen This is illegal in the UK, it certainly runs afoul of the Computer Misuse Act

@SimoKohonen If audited company allows it, it’s not a crime, better us than them πŸ˜‰

@SimoKohonen Business as usual

‼️ New course from Mandiant Academy: Basic Static and Dynamic Analysis. Learn IOCs, investigation workflows, safe environments and analysis techniques. Start your training today πŸ‘‰ https://bit.ly/3JxgAqC

Image in tweet by Simo

WTF is this detection for a Cobalt Strike payload? How an analyst is supposed to interpret this?

Image in tweet by Simo

My intermediate level malware analysis course is there. 60% off for the next two weeks. https://malwareanalysis-for-he...

We need more AI infosec guides, not fewer!!

Image in tweet by Simo

Share this thread

Read on Twitter

View original thread

Navigate thread

1/14