Jimmy Wylie's Avatar

Jimmy Wylie

@mayahustle.com

I look for ICS threats, and spend a lot of time reverse engineering. Distinguished Malware Analyst @ Dragos. Lead Analyst on TRISIS and PIPEDREAM. He/Him

750
Followers
208
Following
100
Posts
22.11.2024
Joined
Posts Following

Latest posts by Jimmy Wylie @mayahustle.com

Photo of smiling Jimmy holding a gold and red trophy in right hand. The top of the trophy is a gold statue of a king holding a sceptre. The king is standing on a red column, with a white base and a gold plaque.

Photo of smiling Jimmy holding a gold and red trophy in right hand. The top of the trophy is a gold statue of a king holding a sceptre. The king is standing on a red column, with a white base and a gold plaque.

Hand holding a trophy of king standing on a column. At the base of the column is the text:
‘MY NAME IS OZYMANDIAS, KING
OF KINGS; LOOK ON MY WORKS, 
YE MIGHTY, AND DESPAIR

Hand holding a trophy of king standing on a column. At the base of the column is the text: ‘MY NAME IS OZYMANDIAS, KING OF KINGS; LOOK ON MY WORKS, YE MIGHTY, AND DESPAIR

I earned my first CVE credit (CVE-2025-7676) for helping with a Windows ARM vuln. So, to commemorate the credit, my coworker, Reid, presented me last week with a Trophy of Perpetual Futility, because there’s always more work to do.

raw.githubusercontent.com/reidmefirst/...

19.02.2026 14:32 👍 13 🔁 0 💬 2 📌 0
Preview
Dragos 2026 OT Cybersecurity Report: a Year in Review Get the latest OT threats, vulnerabilities, and lessons learned from real-world incidents in this year’s 2026 OT Cybersecurity Report.

The Dragos 2026 Year In Review Report is live: 3 new threat groups, updates from 3 of our more active threat groups, and (my personal favorite) coverage of a subset ICS-related capabilities that we found last year.

17.02.2026 15:01 👍 5 🔁 2 💬 0 📌 0
Post image

I've spent a lot of time reversing ICS malware. Recently, I've been building it with AI tools. While there's been plenty of commentary and news about AI and malware, I'm excited to share what I learned actually trying to build some at S4x26.

Stage 2, Feb 24, 12pm.

10.02.2026 14:10 👍 1 🔁 1 💬 0 📌 0
Preview
Energy Sector Incident Report - 29 December 2025 CERT Polska presents a report on the analysis of an incident in the energy sector that occurred on 29 December 2025. The attacks were destructive in nature and targeted wind and photovoltaic farms, a large combined heat and power plant, and a company from the manufacturing sector. The publication aims to raise awareness of the risks associated with sabotage in cyberspace.

CERT.PL's report on the attacks against Polish infrastructure. A full destructive playbook enabled by default credentials: firmware corruption, wipers, factory resets, even booted Tiny Core Linux on KVM to DD-wipe servers. The report is excellent work.

30.01.2026 23:55 👍 1 🔁 0 💬 0 📌 0

I know I'm feeling stressed out when I go back to reading Thich Nhat Hahn. His teachings calm me, and I need that reminder that happiness is available in any moment despite circumstance. I'm not even Buddhist. or maybe I am? He'd probably say the distinction isn't important.

29.01.2026 21:19 👍 4 🔁 1 💬 0 📌 0
Preview
Intel Report | ELECTRUM: Cyber Attack on Poland's Electric System 2025 | Dragos A 2025 cyber attack on Poland’s electric system highlights both risk and resilience in modern power grids. Download the report →

This is the first known attack on DERs. Attackers compromised RTUs at 30 different sites. The report has an overview, defensive guidance, and a comparison to past ELECTRUM ops.
Hats off to CERT Polska for leading the charge, and kudos to our Intel team for the hard work.

27.01.2026 23:00 👍 5 🔁 3 💬 0 📌 0
Post image

I spent a couple months arguing with Claude and Copilot while building FrostyGoop variants for DNP3 (and Modbus), keeping detailed notes on what worked and what didn't. At S4, I’ll share my honest assessment of these tools and how they might lower barriers to ICS malware dev. See you in Miami!

16.12.2025 15:00 👍 3 🔁 1 💬 0 📌 0
Dismantling the SEOS Protocol
Dismantling the SEOS Protocol YouTube video by Black Hat

Finally sharing what’s been under wraps for months.

Adam Foster and I tore into HID SEOS to build the first open-source implementation for Proxmark3.

This is our Black Hat Asia 2025 story → www.youtube.com/watch?v=mnhG...

#RFIDHacking #SEOS #CyberSecurity

11.11.2025 02:26 👍 5 🔁 1 💬 0 📌 0
Associate Project Manager Hanover, MD

We have a job opening in our Community Defense Program (CDP) which gives small utilities free access to the Dragos Platform. This opening is a chance to do some truly meaningful work for the community.

Job Description: job-boards.greenhous...

CDP Description:
www.dragos.com/commu...

17.11.2025 17:00 👍 9 🔁 1 💬 0 📌 0

Had a great time presenting at LSU this week on hunting and analyzing Go and Python malware samples while hunting for ICS malware. For those who couldn't make it, you can catch a recording of this talk from Hou.Sec.Con last month with @sam-hans0n.bsky.social

www.youtube.com/watc...

14.11.2025 14:01 👍 2 🔁 1 💬 0 📌 0
Preview
9 Malicious NuGet Packages Deliver Time-Delayed Destructive ... Socket researchers discovered nine malicious NuGet packages that use time-delayed payloads to crash applications and corrupt industrial control system...

Props to their Threat Research team for identifying and publicizing these harmful packages. If you want to understand what the code does, check out their post.

Bottom line: Always verify your dependencies and their sources!

socket.dev/blog/9-ma...
6/6

11.11.2025 17:31 👍 1 🔁 0 💬 0 📌 0

The evidence also doesn't rule out security research as an explanation.
I’d give this a low confidence assessment for malicious intent. That said, it's normal for analysts to reach different conclusions, and this isn't a criticism of Socket's solid technical analysis.
5/6

11.11.2025 17:31 👍 1 🔁 0 💬 1 📌 0

- The lure isn't convincing.
- The packages are unpopular (even by Socket's metrics), so infection of new projects seems improbable.
- Why would existing projects switch to the malicious dependencies?
- There's no C2 code to confirm victims. How would an attacker know if this worked?
4/6

11.11.2025 17:31 👍 1 🔁 0 💬 1 📌 0

While I agree the code is harmful and the packages are suspicious, I'm not convinced about the supply chain attack angle -- or if it is one, it’s not a particularly effective one. Several factors give me pause:
3/6

11.11.2025 17:31 👍 1 🔁 0 💬 1 📌 0

No legitimate projects were compromised, and no S7, Sharp7, or Siemens codebases were modified. Socket identified packages published by a separate user ("shanhai666") containing code that probabilistically kills host processes and causes database write failures within specific date ranges.
2/6

11.11.2025 17:30 👍 1 🔁 0 💬 1 📌 0

A lot of folks have reached out about Socket’s recent report on a supply chain attack using malicious NuGet packages to target Siemens S7 protocol and other PLCs.

This is not a supply chain attack in the traditional sense.
1/6

11.11.2025 17:30 👍 3 🔁 2 💬 1 📌 0
Preview
Modbus Offset vs. Addressing: Why Does It Matter? Discover the relationship between the Modbus address used by TOP Server and the physical offset in a device when enabling/disabling Zero-Based Addressing.

“No, that’s my neighbor, Bobby. I live at 502, but you have to write 501 on the package or the mail carrier brings it to the wrong house. He has a problem.”

ICS is fun. This blog covers the problem:
blog.softwaretoolbox.com/topserver-mo...

(H/T to Reid Wightman for inspiring this post)

(2/2)

31.10.2025 17:18 👍 2 🔁 1 💬 0 📌 0

Learning Modbus is basically this conversation:

“I live at 502 Westport Ave.”

“Sweet, I’m sending you a package.”

“Wait! If you talk to the mail carrier, my address is 501 Westport Ave.”

“Oh. So, you live at 501 Westport?”

(1/2)

31.10.2025 17:18 👍 2 🔁 1 💬 1 📌 0

Other questions I'm exploring:

How much does AI know about ICS protocols?

Does AI truly lower the barrier for entry? If not, is that an AI limitation or am I just "holding it wrong"?

Is it shortening my development time? Or solving some problems but creating new ones for a net-zero benefit?
2/2

27.10.2025 14:04 👍 3 🔁 0 💬 0 📌 0
Post image

I'm speaking at S4x26 on creating a FrostyGoop-style tool using AI. This experiment has been a good avenue for tackling a few questions I've had about AI-enabled software development. Most importantly, just how easy is it?

I'm excited to share what I learn come February!


1/2

27.10.2025 14:04 👍 4 🔁 0 💬 1 📌 0
Preview
GitHub - airbus-cert/minusone: Powershell Linter Powershell Linter. Contribute to airbus-cert/minusone development by creating an account on GitHub.

MinusOne, a deobfuscation engine for scripting languages: github.com/airbus-ce...

EPIC Erebus for PCIe and DMA attack research: www.crowdsupply.com/...
3/3

24.10.2025 19:58 👍 1 🔁 0 💬 0 📌 0
Preview
GitHub - cisagov/thorium: A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale. A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale. - cisagov/thorium

Here are a few of the projects I enjoyed learning about this time around:

Thorium Malware Pipeline: github.com/cisagov/t...

CTADL Static Taint Analysis Tool: github.com/sandialab...
2/3

24.10.2025 19:58 👍 1 🔁 0 💬 1 📌 0

I had a great experience at #FTSCon on Monday. Both the speakers and the audience are such high caliber that an interesting discussion can be had at any point during the day. The information presented is useful for folks in any technical aspect of cybersecurity, not just DFIR folks.
1/3

24.10.2025 19:58 👍 2 🔁 1 💬 1 📌 0

MacOS 26 really kills the T2 Intel Macs. It's technically compatible, but the experience is a drag, especially just after boot with all the indexing. I'm going to put a T2 Linux distro on this thing, and hope it improves the experience. I refuse to throw away a computer that's barely 5 years old.

21.10.2025 18:49 👍 0 🔁 0 💬 1 📌 0
Preview
Giovanni’s Pop-Up Store - Double Good Online Fundraising Click here to buy our delicious popcorn and 50% of your purchase benefits this fundraiser. #doublegood #dgpopup

My cousin is raising money to go to the MLS Next Youth Showcase.

You buy tasty popcorn, and the money funds the trip with an option to donate to teachers.

Check it out and support a good cause! I just bought a bunch for our weekly board game meetup :)

s.dgpopup.com/0o409evs/rp

18.10.2025 21:19 👍 0 🔁 0 💬 0 📌 0
DEF CON 33 - Don’t Cry Wolf: Evidence based assessments of ICS Threats - Jimmy Wylie & Sam Hanson
DEF CON 33 - Don’t Cry Wolf: Evidence based assessments of ICS Threats - Jimmy Wylie & Sam Hanson CS Malware is rare. Yet, ICS Malware like FrostyGoop and TRISIS, and related discoveries like COSMICENERGY, were all found on VirusTotal, so analysts still hunt for novel ICS Malware in public malware repositories. In the process, they discover all kinds of tools: research, CTFs, obfuscated nonsense

Our DEF CON33 ICS Village talk is now on YouTube!

@sam-hans0n.bsky.social and I share stories of malware we discovered while searching for ICS threats, and discuss our approach to assessing their reputation.

Don't Cry Wolf: Evidence-Based Assessment of ICS Threats

16.10.2025 19:18 👍 6 🔁 5 💬 0 📌 1

I couldn’t think of a picture, so here’s an image from an old show that probably planted the seed for me to become a malware analyst.

10.10.2025 18:40 👍 1 🔁 0 💬 0 📌 0
Post image

In ICS, malware analysis can feel like archaeology. I started the week with a 13 year old sample and ended the week with @sam-hans0n.bsky.social pinging about an 18 years old sample.

So, save your old Windows ISOs and VMs, you might need them!

10.10.2025 18:40 👍 4 🔁 1 💬 1 📌 0

I enjoyed it, but I’ll readily admit, it’s not for everyone.

08.10.2025 16:45 👍 1 🔁 0 💬 1 📌 0
Selfie of Jimmy holding a belt buckle. The belt buckle is a western style buckle. The buckle has Speaker along the top, an image of the HOUSECCON flying saucer logo below it, and an astronaut riding a horse. The bottom of the buckle has the year, 2025. The rest of the buckle is decorated with filigree.

Selfie of Jimmy holding a belt buckle. The belt buckle is a western style buckle. The buckle has Speaker along the top, an image of the HOUSECCON flying saucer logo below it, and an astronaut riding a horse. The bottom of the buckle has the year, 2025. The rest of the buckle is decorated with filigree.

Thanks to @cybrseccon.bsky.social / HOU.SEC.CON for having us last week. (and for a really unique speaker gift!) The conference has grown into a valuable industry event, and I'm looking forward to the next one!

ICYMI, we posted resources from our talk here:
gist.github.com/maya...

08.10.2025 15:51 👍 4 🔁 0 💬 0 📌 0