Jamie Levy 🦉
banner
gleeda.bsky.social
Jamie Levy 🦉
@gleeda.bsky.social
@volatilityfoundation.org Core Dev | Art of Memory Forensics co-author | DFIR trainer and enthusiast | Director of Adversary Tactics @huntress.com
It’s raining, and feeding time, so what do we do? Sheep and goat dance set!!!

💣💥 turn up the volume! 🔊🔊
June 7, 2025 at 12:46 AM
When you've replied to a tweet from S1 a couple months ago asking for an updated url for a panel Chris Krebs was on, and wake up to a hate bot storm demanding his head. oh what a time to be alive 🫠
April 10, 2025 at 9:17 PM
Hands on Keyboard broken down by hour of day
February 11, 2025 at 6:58 PM
Covering some details of how Star Blizzard's attack chain looks like
February 11, 2025 at 6:48 PM
@laughingmantis.bsky.social and @johnhammond.bsky.social covering some phishing tactics seen in the last year
February 11, 2025 at 6:46 PM
@laughingmantis.bsky.social and @johnhammond.bsky.social covering the TTR of various ransomware attacks we've seen in the last year (Time-to-Ransom)
February 11, 2025 at 6:44 PM
talking about how VERY NON STEALTHY ransomhub is
February 11, 2025 at 6:40 PM
a view of the most common ransomware actors we saw over the last year
February 11, 2025 at 6:35 PM
We looked at what was happening in a few different industries in our customer base
February 11, 2025 at 6:32 PM
looking at lots of infostealers
February 11, 2025 at 6:31 PM
Some insights currently being discussed:
February 11, 2025 at 6:17 PM
Not today, satan! 🤣🤣🤣
December 20, 2024 at 6:22 PM
December 20, 2024 at 1:35 AM
When the items on your timeline align 😆
November 22, 2024 at 4:45 PM
🔎 We did some reverse engineering to get a better idea of the capabilities of this malware. One interesting thing found was a Cyrillic language killswitch and a strange string encryption scheme 🤣
November 15, 2024 at 3:34 AM
The next day the threat actor returned, logging in via RDP, and within approximately 15 minutes, began executing several commands that deployed file encryption via previously identified network shares. 🦹
November 15, 2024 at 3:32 AM
They then installed WinRAR and FileZilla in order to compress and exfiltrate files from the victims machines. 📂

The command used to compress files, shows the types of files they were interested in. They then uninstalled WinRAR and FileZilla.
November 15, 2024 at 3:31 AM
🧵Today’s blogpost focuses on a newer ransomware variant named SafePay. Needless to say, ransomware sucks. When this new variant appeared, it gained our attention. 👀

Let’s dig into what happened and what makes it tick ⬇️:
November 15, 2024 at 3:29 AM
Matt is going over the "not so helpful" helpful desk challenge (based on SlashAndGrab):
November 12, 2024 at 6:20 PM
An example of some of the challenges and how they came about
November 12, 2024 at 6:14 PM
Describing some of the methodology for building out some of the CTF challenges
November 12, 2024 at 6:12 PM
Now for the meaty part of the presentation!
November 12, 2024 at 6:09 PM
The top 10!
November 12, 2024 at 6:06 PM
Shout out to all the challenge authors and supporters
November 12, 2024 at 6:05 PM
November 3, 2024 at 12:54 AM