Matthijs R. Koot's Avatar

Matthijs R. Koot

@cyberwar.nl

IT, privacy, security, democracy. PhD. PGP: 51F9 8FC9 C92A 1165 (http://keybase.io/mrkoot). Employed as IT security specialist. Mastodon: @mrkoot@infosec.exchange LinkedIn: /in/mrkoot

743
Followers
488
Following
201
Posts
02.05.2023
Joined
Posts Following

Latest posts by Matthijs R. Koot @cyberwar.nl

The official microG OS project (lineage.microg.org) leaked their private keys for logging into their servers and signing releases:

github.com/lineageos4mi...

We make our official builds on local machines. Our signing machine's keys aren't ever on any storage unencrypted.

06.03.2026 13:48 πŸ‘ 86 πŸ” 16 πŸ’¬ 4 πŸ“Œ 4
Preview
Intellexa Founder, Three Others Sentenced to 8 Years in Prison Over Greek Spyware Scandal - The Citizen Lab A Greek court sentenced four Intellexa executives to prison for their role in a 2022 scandal that involved the use of Predator spyware against more than 90 public figures in the country. Citizen Lab r...

Intellexa Founder, Three Others Sentenced to 8 Years in Prison Over Greek Spyware Scandal (5 March 2026) citizenlab.ca/intellexa-fo... by @citizenlab.ca

06.03.2026 09:01 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch Security researchers say exploits used by governments to hack into Apple iPhones have been found used by cybercriminals. They warned of an emerging market for "second hand" exploits.

Security researchers say exploits used by governments to hack into Apple iPhones have been found used by cybercriminals. They warned of an emerging market for "second hand" exploits.

03.03.2026 23:33 πŸ‘ 45 πŸ” 41 πŸ’¬ 2 πŸ“Œ 4
Phrack Prophile on FX Click to read the article on phrack

phrack.org/issues/68/2#...
Another legend has crossed over. Thank you @fxv2.bsky.social for being your kind, brilliant self, whose contributions are too many to name, not just in hacking, but in being a superconnector who I now know is responsible for so many friendships & marriages. You are missed.

02.03.2026 19:09 πŸ‘ 34 πŸ” 10 πŸ’¬ 3 πŸ“Œ 1
Preview
Anonymous credentials: an illustrated primer This post has been on my back burner for well over a year. It’s been sitting here unwritten, not because the topic is unimportant β€” in fact, with every single month that goes by, I become mor…

I wrote a new post on anonymous credentials and how to build them. All of this is in service on a longer future post on how these will fit into age verification systems. blog.cryptographyengineering.com/2026/03/02/a...

02.03.2026 18:39 πŸ‘ 53 πŸ” 24 πŸ’¬ 2 πŸ“Œ 2
Preview
How Russia’s fatalities compare with Ukraine’s After four years of fighting, our modelling reveals a grim toll

On the anniversary of the Russian invasion of Ukraine, our modelling suggests that Vladimir Putin is losing more men than he can recruit. Our charts explain the toll

25.02.2026 07:40 πŸ‘ 55 πŸ” 24 πŸ’¬ 1 πŸ“Œ 1
Preview
Treasury sanctions Russian zero-day broker accused of buying exploits stolen from U.S. defense contractor | TechCrunch The U.S. Treasury announced it was imposing sanctions against a Russian broker of zero-day exploits, its founder and two affiliates, citing a threat to U.S. national security. Another affiliated zero-...

NEW: The U.S. government is sanctioning Russian zero-day broker Operation Zero and its founder, alleging it acquired stolen hacking tools from U.S. defense contractor L3Harris Trenchant.

The U.S. said former Trenchant boss Peter Williams stole and sold these exploits to Operation Zero.

24.02.2026 19:03 πŸ‘ 16 πŸ” 10 πŸ’¬ 2 πŸ“Œ 2
Preview
Reverse engineering Realtek RTL8761B* Bluetooth chips, to make better Bluetooth security tools & classes | Dark Mentor LLC We hold this truth to be self-evident&#58; SUFFERING BUILDS STRENGTH! In this talk I will walk you through the trials, tribulations, and triumph(!) of the worst debugging setup I've ever hacked together, which I used to reverse engineer the Realtek RTL8761B* family of Bluetooth chips.<p>This work was done because Bluetooth security tools are in an abominable state. We use "CSR4" (Cambridge Silicon Radio) dongles that don't support packets newer than Bluetooth 4.0 (released in 2010!), just to be able to spoof the Bluetooth Device Address (BDADDR) for MitM attacks.<p>Veronica Kovah & I have been creating Bluetooth security classes for <a href="https://ost2.fyi/">OpenSecurityTraining2</a>. And we wanted to use better hardware; ideally something that supports BT 5.4 (released in 2023). So I bought a bunch of cheap dongles off Amazon, and found that most of them used the same RTL8761B chip. So the goal was clear&#58; at a minimum, figure out a way to spoof the BDADDR on these dongles. But I also a set out a nice-to-have stretch goal - to figure out how to use these dongles to send custom LMP packets (which are architecturally not meant to be under full user control.) That way, could replace a bulky and expensive $55 dev board (that is only used for BT Classic), with a cheap and small $14 USB dongle (which has a better antenna to boot!) This would make Blue2thprinting (released at Hardwear.io 2023), and thus Bluetooth reconnaissance & vulnerability assessment, cheaper & better.<p>Bloodied (but not broken) by the ordeal, I achieved my goals and stretch goals. And given that there are no public descriptions of how Realtek Bluetooth chips work, I look forward to sharing hitherto-unknown information about how to navigate and understand these mostly-16-bit-MIPS-code systems. And I'll discuss how their ROM-"patch"ing firmware update mechanism works, how you can patch it to change its code too, and the security implications thereof.

Video released for "Reverse engineering Realtek RTL8761B* Bluetooth chips, to make better Bluetooth security tools & classes" (from @hardwear-io.bsky.social). Slides & video link here:
darkmentor.com/publication/...

23.02.2026 12:28 πŸ‘ 4 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Preview
Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say Palo Alto Networks opted not to tie China to a global cyberespionage campaign the firm exposed last week over concerns that the cybersecurity company or its clients could face retaliation from Beijing, according to two people familiar with the matter.

Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say reut.rs/4ae6Uw2

12.02.2026 23:30 πŸ‘ 11 πŸ” 8 πŸ’¬ 3 πŸ“Œ 0
Post image

The general counsel uploaded a picture on Linkedin showing the web panel of Paragon's spyware.

The panel shows a phone number in Czechia, Apps, Accounts, media on the phone, the interception status and numbers extracted from social media applications.

11.02.2026 15:29 πŸ‘ 80 πŸ” 26 πŸ’¬ 4 πŸ“Œ 6
Preview
DOJ says Trenchant boss sold exploits to Russian broker capable of accessing 'millions of computers and devices' | TechCrunch The former boss of the L3Harris-owned hacking and surveillance tools maker Trenchant faces nine years in prison for selling several exploits to a Russian broker, which counts the Russian government am...

NEW: U.S. prosecutors say the hacking tools that Peter "Doogie" Williams stole from defense contractor L3Harris Trenchant could have been used against "millions of computers and devices" worldwide.

Williams said he didn't know the tools could end up in the hands of Russia or other governments.

11.02.2026 18:42 πŸ‘ 9 πŸ” 7 πŸ’¬ 1 πŸ“Œ 3
Preview
Hacker linked to Epstein removed from Black Hat cyber conference website | TechCrunch Emails published by the Justice Department revealed cybersecurity veteran Vincenzo Iozzo emailed, and arranged to meet, Jeffrey Epstein multiple times between 2014 and 2018.

NEW: Cybersecurity veteran Vincenzo Iozzo, whowas linked to Epstein, has been removed from the webpage of the Black Hat conference review board.

Iozzo was in touch with Epstein 2014 to 2018, including after new stories came out about Epstein's sex trafficking crimes in late 2018, emails show.

12.02.2026 19:34 πŸ‘ 49 πŸ” 30 πŸ’¬ 1 πŸ“Œ 2
Preview
Gladys Mae West obituary: mathematician who pioneered GPS technology Nature - She made key contributions to US cold-war science despite facing huge barriers as a Black woman.

Obituary: Gladys Mae West (1930-2026) mathematician who pioneered GPS technology

go.nature.com/469BlAW

31.01.2026 15:45 πŸ‘ 175 πŸ” 60 πŸ’¬ 4 πŸ“Œ 6

Jeff Bezos’s wealth has increased an average of $70 million every day of 2026, meaning that he could have offset The Post’s losses with what he’s made since Monday.

05.02.2026 02:48 πŸ‘ 15314 πŸ” 4643 πŸ’¬ 445 πŸ“Œ 251
Preview
Spyware maker is hijacking diplomatic efforts to limit commercial hacking, civil society warns Spyware maker NSO Group trumpeted the company’s participation in the Pall Mall Process, which drew criticism from civil society leaders and government officials who called out human rights abuses.

UK and French govts say they "didn't invite" NSO to participate in Pall Mall after spyware maker trumpets its participation in annual "transparency report." French officials note "extremely serious" allegations involving Pegasus in France

therecord.media/spyware-make...

02.02.2026 14:25 πŸ‘ 9 πŸ” 5 πŸ’¬ 0 πŸ“Œ 1
To:
Jeffrey Epsteinfjeevacation@gmail.com]
From:
Sent:
Wed 5/28/2014 3:23:21 AM
Subject:
Before being freed, hacker Sabu was 'extraordinary' FBI informant - Los Angeles Times
Hire this kid. Im serious.
http://www.latimes.com/nation/la-na-hacker-sentencing-20140528-story.html

To: Jeffrey Epsteinfjeevacation@gmail.com] From: Sent: Wed 5/28/2014 3:23:21 AM Subject: Before being freed, hacker Sabu was 'extraordinary' FBI informant - Los Angeles Times Hire this kid. Im serious. http://www.latimes.com/nation/la-na-hacker-sentencing-20140528-story.html

Well shit, here we go again with the latest Epstein files drop.

Here’s an email from someone to Jeffrey Epstein telling him that he should hire Anonymous snitch sabu.
www.justice.gov/epstein/file...

30.01.2026 17:07 πŸ‘ 207 πŸ” 49 πŸ’¬ 7 πŸ“Œ 21
Preview
Somebody used spoofed ADSB signals to raster the meme of JD Vance over Mar-a-Lago using AF2 ICAO identity This, if it is still visible: Via: Next up, age verification for ADSB?

Somebody used spoofed ADSB signals to raster the meme of JD Vance over Mar-a-Lago using AF2 ICAO identity
https://alecmuffett.com/article/143548
#adsb #trump

28.01.2026 09:19 πŸ‘ 6 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Post image

Only ninety-nine (99) days to go!! High time to submit your abstract(s) to the program committee. We are really looking forward to receive & review them! cfp.nluug.nl.

28.01.2026 08:19 πŸ‘ 1 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

This is directly related to the case of Charles Edward Littlejohn who stole the tax records of Trump, Bezos and other billionaires and leaked them to ProPublica, which published a series of stories in 2021 about them

26.01.2026 15:36 πŸ‘ 15 πŸ” 9 πŸ’¬ 3 πŸ“Œ 1
Hoepman, J.-H. (2025). Is Authenticity an Effective Antidote to Misinformation?. Weizenbaum Journal of the Digital Society, 5(4). https://doi.org/10.34669/WI.WJDS/5.4.3

Hoepman, J.-H. (2025). Is Authenticity an Effective Antidote to Misinformation?. Weizenbaum Journal of the Digital Society, 5(4). https://doi.org/10.34669/WI.WJDS/5.4.3

❓Can digital signatures stop misinformation?

A new #WJDS paper by Jaap-Henk Hoepman argues they can’t ❌. Practical barriers exist, and there may be negative side effects.

πŸ’‘Read: doi.org/10.34669/WI....

#Misinformation #DigitalTrust #Research

09.12.2025 11:09 πŸ‘ 3 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Boycott U.S. journals and conferences

Boycott U.S. journals and conferences
blog.xot.nl/2026/01/21/b...

21.01.2026 09:13 πŸ‘ 4 πŸ” 2 πŸ’¬ 1 πŸ“Œ 1

Telegram’s battle with European regulators could force it to hire thousands of content moderators to tackle illegal content. Documents obtained by Follow the Money show how Telegram is trying to fend off tougher oversight from Brussels.

www.ftm.eu/articles/tel...

20.01.2026 07:14 πŸ‘ 7 πŸ” 8 πŸ’¬ 0 πŸ“Œ 0
Preview
Join | OCCRP We are supported by people like you. Support us by becoming a member today.

For the last few days, we’ve been fighting a DDoS attack from highly resourced actors trying to make OCCRP’s reporting inaccessible.

Your backing makes it possible for us to fight back more effectively. If you’d like to help strengthen our efforts, you can donate here: buff.ly/2BWJueR

16.01.2026 13:05 πŸ‘ 11 πŸ” 4 πŸ’¬ 0 πŸ“Œ 0

Now you understand why every pro-Kremlin Twitter bot has spent 90% of its time over the past decade defending or pushing crypto and blockchain tech while randomly publishing some political tweet once in a while?

10.01.2026 16:29 πŸ‘ 24 πŸ” 21 πŸ’¬ 2 πŸ“Œ 0
Preview
Spionage: BND hârte jahrelang US-PrÀsident Barack Obama ab Der deutsche Geheimdienst überwachte regelmÀßig Telefonate des damaligen US-PrÀsidenten an Bord der Air Force One. Erlaubnis von Angela Merkel hatte der BND nicht.

Germany’s foreign intelligence agency (BND) intercepted phone conversations of former President Barack Obama while he was aboard Air Force One over several years. The interceptions exploited vulnerabilities in the aircraft’s encryption and known frequencies.

www.zeit.de/politik/ausl...

04.01.2026 18:25 πŸ‘ 119 πŸ” 45 πŸ’¬ 7 πŸ“Œ 20
Perceptions Of Counterintelligence In Corporate And Academic Sectors: Risks, Awareness, And Strategic Implications The United States is in the middle of an intelligence war. Foreign adversaries, including their intelligence services and state-sponsored actors, employ increasingly sophisticated technologies and methods to access our most valuable innovations and secrets. The importance of implementing counterintelligence (CI) practices across all sectors of American society has never been greater. As our adversaries increasingly target non-governmental data environments, it has become essential to address security gaps in our nation’s critical industries, supply chains, and academic institutions. While the last two decades have seen the widespread adoption of cybersecurity protocols, malign actors continue to evolve their tactics to exploit both technical and human vulnerabilities. Counterintelligence can and should be a vital tool for corporations and academia which have become increasingly vulnerable targets for foreign espionage, theft, sabotage, and influence operations. By providing strategic insights and actionable practices, counterintelligence enables organizations to effectively and efficiently recognize and respond to threats that fall outside the scope of traditional cybersecurity. This study aims to explore how counterintelligence is perceived in civilian sectors – specifically corporate and academic institutions – in response to escalating intelligence threats. By surveying a diverse range of professionals in the academic and corporate sectors, this study assesses the awareness, attitudes, and institutional barriers to adopting CI practices and seeks to highlight key knowledge gaps and identify opportunities for targeted awareness, training, and investment. The results will inform policy and provide strategic recommendations for building a CI-conscious culture across sectors.

New addition

Report: Perceptions Of Counterintelligence In Corporate And Academic Sectors: Risks, Awareness, And Strategic Implications (published 22-11-2025)
https://zenodo.org/records/17681907

16.12.2025 22:31 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
ResidentBat: Operational Report & Advisory on KGB spyware in Belarus in 2025 - RESIDENT.NGO THREAT LAB RESIDENT.NGO has helped uncover a malware attack targeted at a Belarus-based journalist by the Belarusian secret service (KGB). This document serves as a short synopsis of the case, offering safety re...

Resident.NGO has an excellent write-up of a case where a journalist was interrogated by the Belarusian KGB and then had spyware installed on their phone. The recommendations are sensible and practical resident.ngo/lab/writeups...

See also this @rsf.org report rsf.org/en/exclusive...

17.12.2025 21:05 πŸ‘ 1 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

Belarusian KGB put spyware on phones of detained journalist.

Growing list of cases where authoritarian regimes use detention to implant spyware on phones:

🦠Belarus
🦠Kenya
🦠Serbia

And likely plenty more.

Important investigation & reminder that dictators don't always need zero-days.

17.12.2025 15:45 πŸ‘ 55 πŸ” 36 πŸ’¬ 1 πŸ“Œ 0
Preview
Pope tells Italian spies not to smear politicians or journalists Pope Leo on Friday urged Italy's intelligence services to avoid smearing public figures and journalists, saying abuse of confidential material risked undermining democracy and public trust.

The Pope involves himself in Italy's spy scandal and asks intel officials to respect people's privacy and not leak data and smear people with hacked data

www.reuters.com/world/pope-t...

14.12.2025 17:56 πŸ‘ 12 πŸ” 4 πŸ’¬ 0 πŸ“Œ 1
Preview
How Danes je nov dan helped stop dangerous spyware in Slovenia - European Digital Rights (EDRi) EDRi affiliate Danes je nov dan launched a multi-faceted campaign in response to a government proposal that would allow the Slovene Intelligence and Security Agency (SOVA) to use invasive spyware and ...

How EDRi affiliate @danesjenovdan.si helped stop dangerous spyware in Slovenia (11 December 2025) edri.org/our-work/how...

11.12.2025 09:09 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0