{"version":"https://jsonfeed.org/version/1","title":"Micro.blog - Marcus Hutchins :verified:","home_page_url":"https://micro.blog","feed_url":"https://micro.blog/posts/malwaretech@infosec.exchange","_microblog":{"about":"https://micro.blog/about/api","id":"168909","username":"malwaretech@infosec.exchange","bio":"Cybersecurity","pronouns":"","is_following":false,"is_you":false,"following_count":0,"discover_count":0},"author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://micro.blog/photos/200/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg"},"items":[{"id":"86498074","content_html":"<p>After years of planning a potential collab, I finally got to sit down with fellow cybersecurity YouTuber David Bombal for an in person interview! Below you can check out the video from what will hopefully be the first of many more collaborations 😃 : <br><a href=\"https://www.youtube.com/watch?v=KsXzTz5H2QQ\"><span class=\"invisible\">https://www.</span><span>youtube.com/watch?v=KsXzTz5H2QQ</span><span class=\"invisible\"></span></a></p>","summary":"","url":"https://infosec.exchange/@malwaretech/116252871204512834","date_published":"2026-03-18T23:53:59+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-18 23:53","date_timestamp":1773878039,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86028470","content_html":"<p>I'm convinced this technology was invented purely just to troll me</p><div class=\"microblog_collection\">\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F214%2F885%2F039%2F361%2F548%2Foriginal%2F51af03680fc2daa9.png\" alt=\"\" loading=\"lazy\"><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F214%2F885%2F037%2F108%2F488%2Foriginal%2Fb31ecbc1193baba5.png\" alt=\"\" loading=\"lazy\"><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F214%2F885%2F058%2F629%2F164%2Foriginal%2Fed396b5f8144aab3.png\" alt=\"\" loading=\"lazy\">\n</div>","summary":"","url":"https://infosec.exchange/@malwaretech/116214886214176539","date_published":"2026-03-12T06:53:54+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-12 06:53","date_timestamp":1773298434,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"85839667","content_html":"<p><span class=\"h-card\"><a href=\"https://infosec.exchange/@c0coChannel\" class=\"u-url mention\">@<span>c0coChannel</span></a></span> I think you're probably right. I see similarly aggressive responses when talking about how VPNs don't protect you from surveillance. People seem to be uncomfortable with the idea that serious privacy is actually difficult and not just something you can buy</p>","url":"https://infosec.exchange/users/malwaretech/statuses/116200224472445803","date_published":"2026-03-09T16:45:14+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-09 16:45","date_timestamp":1773074714,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85811664","content_html":"<p><span class=\"h-card\"><a href=\"https://discuss.systems/@tobinbaker\" class=\"u-url mention\">@<span>tobinbaker</span></a></span> pretty sure it is</p>","url":"https://infosec.exchange/users/malwaretech/statuses/116198069339271768","date_published":"2026-03-09T07:37:09+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-09 07:37","date_timestamp":1773041829,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85811620","content_html":"<p><span class=\"h-card\"><a href=\"https://swecyb.com/@troed\" class=\"u-url mention\">@<span>troed</span></a></span> nah, it’s definitely not this one. My LinkedIn connections are actual domain expert not a bunch of “tech savvy” vpn fanboys</p>","url":"https://infosec.exchange/users/malwaretech/statuses/116198061859695769","date_published":"2026-03-09T07:35:15+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-09 07:35","date_timestamp":1773041715,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85807136","content_html":"<p>lol, this post really brought out all the insufferable fanboys. I'm not gonna pretend like I didn't know which of the 3 platforms I posted this on would have a bunch of people deeply personally offended by criticism of a corporation</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F197%2F505%2F970%2F823%2F704%2Foriginal%2Fdf915c7f1d605115.png\" alt=\"\" loading=\"lazy\"></p>","url":"https://infosec.exchange/users/malwaretech/statuses/116197522462500310","date_published":"2026-03-09T05:18:04+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-09 05:18","date_timestamp":1773033484,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85806882","content_html":"<p><span class=\"h-card\"><a href=\"https://mas.to/@unCoopervised\" class=\"u-url mention\">@<span>unCoopervised</span></a></span> ya'll fanboys are insufferable</p>","url":"https://infosec.exchange/users/malwaretech/statuses/116197476057736888","date_published":"2026-03-09T05:06:16+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-09 05:06","date_timestamp":1773032776,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85800931","content_html":"<p><span class=\"h-card\"><a href=\"https://bne.social/@james\" class=\"u-url mention\">@<span>james</span></a></span> God, you're insufferable. Enjoy the block list.</p>","url":"https://infosec.exchange/users/malwaretech/statuses/116196769606118034","date_published":"2026-03-09T02:06:37+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-09 02:06","date_timestamp":1773021997,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85792155","content_html":"<p><span class=\"h-card\"><a href=\"https://mstdn.ca/@AT1ST\" class=\"u-url mention\">@<span>AT1ST</span></a></span> No, Apple just outright refused and has enough money to tie most of the federal government lawyers up in court for the rest of their careers</p>","url":"https://infosec.exchange/users/malwaretech/statuses/116196043771081208","date_published":"2026-03-08T23:02:01+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-08 23:02","date_timestamp":1773010921,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85791202","content_html":"<p>It feels like Proton are being intentionally misleading in their statements. They know that most of their customers aren't familiar with how legal process actually works, so are happy to spread half-truths.</p><p>Under US law, a US law enforcement agency (LEA) typically has to apply for a subpoena or search warrant with a US court. The court is then responsible for deciding if the legal bar for search a request has been met, then either grants or denies it.</p><p>The problem is, if a company has no real US footprint (no US corporate entity, offices, servers, etc.), then a US court typically doesn't have the jurisdiction to compel the company to hand over customer data (except in some rare circumstances). Even if the court approved the warrant anyway, it wouldn't really be legally binding.</p><p>Which is why the Mutual Legal Assistance Treaty (MLAT) exists. MLAT enables law enforcement agencies in one company to send requests for information to law enforcement agencies in another. Switzerland has such a treaty with the US. This means that the FBI can request that Swiss authorities hand over a Swiss company's data on their behalf.</p><p>Any country requesting information held by a company in a foreign jurisdiction would typically do so via MLAT. Which means from Proton's perspective, the legal request would appear to originate from their local law enforcement, not the FBI. Which they clearly understand based on their Reddit post.</p><p>Saying \"we don't respond to legal requests from anywhere other than Swiss authorities\" seems very intentionally worded to give the impression that the company does not cooperate with foreign law enforcement. But since it'd be the Swiss authorities handling any such requests, they'd have to comply, since as they admitted, they have to comply with local laws.</p><p>There is, however, some useful (but more nuanced) information here: </p><p>Firstly, MLAT requests are handled by local law enforcement according to local law. So if there is a difference between the law of the sending and recipient country, that might mean the MLAT request is denied. That probably doesn't mean much, because if you're on the FBI's radar, the chances are you did something that is also massively illegal in Switzerland too.</p><p>Secondly, they are 100% correct in saying that no other service provider is going to do any better. They're all beholden to local laws, and the ones that think they're not tend to get their doors blown off by SWAT like CyberBunker did. The only exception is if the company resides in a country which does not cooperate with US law enforcement (which Proton does not).</p><p>But the part that's extremely disingenuous is that the \"we only respond to requests from the Swiss authorities\". That statement is likely intended to imply they don't cooperate with law enforcement in any other countries, which is simply not true. Switzerland has MLAT agreements with over 30 counties.</p><p>People really need to understand that no company is going to shield you from the FBI (or any reputable law enforcement agency). They'll use misleading statements to make it sounds like they don't cooperate with law enforcement, but they do. They have to.</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F195%2F916%2F812%2F004%2F684%2Foriginal%2Fc9b267c29540586b.png\" alt=\"\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@malwaretech/116195917343621283","date_published":"2026-03-08T22:29:52+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-08 22:29","date_timestamp":1773008992,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"85577234","content_html":"<p>Great crowd at Zero Trust World today. Thanks for everyone who came to my keynote and for all the great hallway conversations! 😃</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F177%2F906%2F849%2F825%2F840%2Foriginal%2Fa4da85095c482855.jpeg\" alt=\"\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@malwaretech/116177906933649533","date_published":"2026-03-05T18:09:35+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-05 18:09","date_timestamp":1772734175,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"85335172","content_html":"<p>To prove you’re not a robot, please select all the Mar-a-lago SCIFs</p><div class=\"microblog_collection\">\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F159%2F877%2F899%2F578%2F499%2Foriginal%2F3a626656b7fa7d9a.jpeg\" alt=\"\" loading=\"lazy\"><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F159%2F877%2F890%2F164%2F232%2Foriginal%2Fadbeb2ca8060cd19.jpeg\" alt=\"\" loading=\"lazy\"><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F159%2F877%2F900%2F492%2F849%2Foriginal%2F130cb3068cc24998.jpeg\" alt=\"\" loading=\"lazy\"><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F159%2F877%2F896%2F966%2F692%2Foriginal%2F012fdd246ad1d72f.jpeg\" alt=\"\" loading=\"lazy\">\n</div>","summary":"","url":"https://infosec.exchange/@malwaretech/116159877982964848","date_published":"2026-03-02T13:44:35+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-02 13:44","date_timestamp":1772459075,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"84978268","content_html":"<p>We plan to decrease operational costs for our AI model by building custom servers that are immune to cosmic radiation, then spending trillions of dollars launching them into space. Yes, our CFO did tech themselves math using ChatGPT, why do you ask?</p>","summary":"","url":"https://infosec.exchange/@malwaretech/116129775470988127","date_published":"2026-02-25T06:09:07+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-25 06:09","date_timestamp":1771999747,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"84951865","content_html":"<p>Anthropic when Chinese companies use Claude to train their own AI models vs Anothropic when they’re stealing everyone’s data to train Claude</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F127%2F585%2F108%2F948%2F125%2Foriginal%2Ff474ce1657d0aa13.jpeg\" alt=\"\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@malwaretech/116127585202172979","date_published":"2026-02-24T20:52:06+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-24 20:52","date_timestamp":1771966326,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"83860478","content_html":"<p>When the state sponsored threat actor has vibe coded their entire control server, all the login code is client-side, and they’ve infected themselves with their own malware.</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F037%2F016%2F208%2F070%2F006%2Foriginal%2F211e71447c96776e.jpeg\" alt=\"\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@malwaretech/116037016302187715","date_published":"2026-02-08T20:59:15+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-08 20:59","date_timestamp":1770584355,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"83464238","content_html":"<p>I can’t believe we’re doing this again. It’s just a bot that generates the text you ask it for. If you put it in charge of critical decisions, it will kill people. Not because it’s secretly evil, but because it’s a word generator. It’s like putting your toaster in charge of air traffic control.</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F004%2F940%2F386%2F328%2F628%2Foriginal%2F7d05413e7c3f2ac8.jpeg\" alt=\"\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@malwaretech/116004940468609453","date_published":"2026-02-03T05:01:56+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-03 05:01","date_timestamp":1770094916,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"82498727","content_html":"<p>Since the decline of peer-to-peer botnets it's been difficult to track malware infection externally. But smart contract based C2 infrastructure provided us with unique insights into this campaign.</p><p><a href=\"https://expel.com/blog/clearfake-new-lotl-techniques/\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">expel.com/blog/clearfake-new-l</span><span class=\"invisible\">otl-techniques/</span></a></p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F115%2F930%2F057%2F273%2F141%2F624%2Foriginal%2Fcd7828f8e4bd2c11.png\" alt=\"\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@malwaretech/115930057354689934","date_published":"2026-01-20T23:38:11+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-01-20 23:38","date_timestamp":1768952291,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"82489790","content_html":"<p>My latest blog post investigating a malware campaign which infects victims by utilizing only legitimate infrastructure. The malicious activity spans hundreds of hacked websites, the BSC blockchain, and a popular CDN.</p><p><a href=\"https://expel.com/blog/clearfake-new-lotl-techniques/\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">expel.com/blog/clearfake-new-l</span><span class=\"invisible\">otl-techniques/</span></a></p>","summary":"","url":"https://infosec.exchange/@malwaretech/115929493753547828","date_published":"2026-01-20T21:14:51+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-01-20 21:14","date_timestamp":1768943691,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"82417704","content_html":"<p>Just checking in on my investment portfolio, because apparently computers are appreciating assets now.</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F115%2F923%2F991%2F975%2F311%2F652%2Foriginal%2F7ad2f28be58d8953.jpeg\" alt=\"\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@malwaretech/115923992058761239","date_published":"2026-01-19T21:55:42+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-01-19 21:55","date_timestamp":1768859742,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"82238829","content_html":"<p>I've been researching some malware that uses Blockchain Smart Contracts as Command-and-Control infrastructure. Since blockchain data is public, I was able to write code to track how many new systems the malware infects each day. Blog post coming next week.</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F115%2F908%2F370%2F393%2F956%2F542%2Foriginal%2Fc16b0d7d11059913.png\" alt=\"\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@malwaretech/115908370478379233","date_published":"2026-01-17T03:42:55+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2026-01-17 03:42","date_timestamp":1768621375,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"13805038","content_html":"<p>Highly recommend trying the mobile app. Very clean and easy to use.</p>","summary":"","url":"https://infosec.exchange/@malwaretech/109306579942013661","date_published":"2022-11-08T05:40:46+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2022-11-08 05:40","date_timestamp":1667886046,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"13805037","content_html":"<p>Weirdly getting a similar number of interactions here despite my bird account having 50x more followers</p>","summary":"","url":"https://infosec.exchange/@malwaretech/109306219615199569","date_published":"2022-11-08T04:09:08+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2022-11-08 04:09","date_timestamp":1667880548,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"13805036","content_html":"<p>Recently realized there's not many chill cybersecurity focused message boards, so I made one. Come say hi :)<br><a href=\"https://updatedsecurity.com/invites.html\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">updatedsecurity.com/invites.ht</span><span class=\"invisible\">ml</span></a></p>","summary":"","url":"https://infosec.exchange/@malwaretech/109305481882087081","date_published":"2022-11-08T01:01:31+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2022-11-08 01:01","date_timestamp":1667869291,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"13805035","content_html":"<p>Why Mastodon doesn't need to be better than Twitter to replace it<br><a href=\"https://escapingtech.com/tech/opinions/we-may-be-approaching-critical-mastodon.html\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">escapingtech.com/tech/opinions</span><span class=\"invisible\">/we-may-be-approaching-critical-mastodon.html</span></a></p>","summary":"","url":"https://infosec.exchange/@malwaretech/109303732446373461","date_published":"2022-11-07T17:36:37+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2022-11-07 17:36","date_timestamp":1667842597,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"13805034","content_html":"I think there’s a real chance mastodon could reach critical mass. It’s not about which platform has better features, but where the people are. I joined Mastodon forever ago, but ended up returning to Twitter because that’s where everyone was. This time it actually feels the other way ar... <a href=\"https://infosec.exchange/@malwaretech/109300763887623025\">infosec.exchange</a>","summary":"","url":"https://infosec.exchange/@malwaretech/109300763887623025","date_published":"2022-11-07T05:01:40+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2022-11-07 05:01","date_timestamp":1667797300,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"13805033","content_html":"<p>I really like the way Mastodon can have instances centralized around common interests. It's like Twitter Topics but done right.</p>","summary":"","url":"https://infosec.exchange/@malwaretech/109299835375390624","date_published":"2022-11-07T01:05:32+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2022-11-07 01:05","date_timestamp":1667783132,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"13805031","content_html":"<p>I'm honestly pretty ok with Twitter imploding. It was a decent platform, but this provides a great opportunities for new and better platforms to fill the void.</p>","summary":"","url":"https://infosec.exchange/@malwaretech/109298862077872643","date_published":"2022-11-06T20:58:01+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2022-11-06 20:58","date_timestamp":1667768281,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"13805018","content_html":"<p>I keep getting rate limited from leaving the notification tab open 😆​</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Finfosec.exchange%2Fsystem%2Fmedia_attachments%2Ffiles%2F109%2F298%2F681%2F821%2F904%2F146%2Foriginal%2Fd37d8677d3887ddc.png\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@malwaretech/109298682579686729","date_published":"2022-11-06T20:12:22+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2022-11-06 20:12","date_timestamp":1667765542,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"13805017","content_html":"<p>mastodon.social keeps crashing so I moved my profile here</p>","summary":"","url":"https://infosec.exchange/@malwaretech/109298420510407046","date_published":"2022-11-06T19:05:43+00:00","author":{"name":"Marcus Hutchins :verified:","url":"https://infosec.exchange/@malwaretech","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F288%2F606%2F962%2F694%2F558%2Foriginal%2F7d9f657c412f0031.jpg","_microblog":{"username":"malwaretech@infosec.exchange"}},"_microblog":{"date_relative":"2022-11-06 19:05","date_timestamp":1667761543,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}}]}