Author – Mary-Jane Phillips
I had just finished a course on ransomware when Wanna Cry hit. This ransomware was not typical in the way it was delivered, so I spent time reading media articles and tweets about the ‘outbreak’. Experts on Twitter led me to Malware Tech’s botnet tracker which sadly, is not currently available. At the time, I was able to see the map of Wanna Cry infections over time. (Including in Australia). https://www.malwaretech.com/
I also saw the famous tweet from Marcus Hutchins of Malware Tech about the Wanna Cry ‘kill switch’ domain name being registered. Mass media was much slower to report information than Twitter and was often incorrect. So Twitter has become my source of information on rapidly spreading, malware.
Now, I use malware events on Twitter to fine tune my feed of malware information. This is the simple process.
I particularly like Hasherezade on reverse malware engineering. She is scientific and has a great network of people she calls on for rapid help. https://twitter.com/hasherezade
With a relatively small amount of work over time, Twitter gives you fast access to a diverse range of experts on malware risk, as well as short and long term fixes. The method would probably work for most areas in cybersecurity but it works particularly well for malware due to the speed of communication and collaboration required in the community.