Thomas holds a PhD in computer science and works as a Senior Cyber Security Analyst in the Cyber Threat Intelligence Chapter. 
He is passionately engaged in malware analysis, threat actor tracking, and bug hunting. Throughout the last years he has found numerous vulnerabilities in low-level software and participated in several botnet take-downs. In his blogs he tells techies and non-techies stories about his adventures in binary code wonderland. 

Articles by Thomas Barabosch

Your choice

20200511-LOLSnif-EN

Blog.Telekom

LOLSnif – Tracking Another Ursnif-Based Targeted Campaign

Cybersecurity: Tool leaks are very interesting occurrences in cyber security. In his new blog post, Thomas Barabosch analyze a newer version of Ursnif.

Researcher Thomas Barabosch will give recommendations to fight them and share ways to detect TA505 intrusions in your network.

Blog.Telekom

Eager Beaver: A Short Overview of the Restless Threat Actor TA505

Researcher Thomas Barabosch will give recommendations to fight them and share ways to detect TA505 intrusions in your network.

Smartphone showing a malware warning

Blog.Telekom

Flubot under the Microscope

Maybe Flubot is for SMS what Emotet was for email: a spam kingpin. How does it work and how do the operators prevent infiltration?

Cybersecurity: TA505’s Box of Chocolate

Blog.Telekom

TA505 returns with a new bag of tricks

Cybersecurity: In this blogpost, Thomas Barabosch, shows you a new technique of big threat actor TA505: basically, it’s about operations for big game hunting.

Thomas Barabosch

Blog.Telekom

Dissecting Emotet - Part 1

Cybersecurity: This modular botnet is active at least since 2014, but became very powerful. Thomas Barabosch explains how it works, module by module.

FAQ