 And let me tell you a little about Trilosnap. She's been dedicated the last five years of her career to researching malware and trying to provide some insight in the future attacks around international terrorism. Her goal was to one day work full-time in the United Kingdom, providing offensive research to commercial entities. I'm not sure why the UK, but I mean, you wouldn't tell me that story. Yeah. Why not bring it? OK. Not the greatest food, but like, it's the Harry Potter thing, really, honestly. I'm not, you know, I'm in that generation. All right, cool. All right, guys, so I'm a bit of a basement dweller. So obviously, I'm up here about to shit my pants. But I'm really excited to talk to you today. I swear I'm going to try and make it relevant to what you guys are interested in, too. So like you said, I'm Trilosnap. You can call me Turtle or Turt, whatever. And I'm going to talk today about malware and biology. We're going to make some connections here. So last year there was a, you can read this while I'm talking. I'm not going to read it to you. We're not in elementary school here. So last year, there was a talk about this. It was very similar. It was about creating something that is based off of the HIV virus, that it's a malware. So there was a discussion about comparing HIV to the Dooku virus and what else can we compare it to? What's the evolution? Like what are the connections that we can make here so that we can advance this field? And this field meaning just get some research shit and with malware, cybersecurity, you know, if you guys are on the bad side of things, this might be an interesting talk for you too because this is some pretty scary shit that I'm about to talk about. All right, so what I'm going to talk about is not necessarily malware, you know, spreading its virus to humans. And, you know, we're going to catch like the HIV of computer viruses or anything like that. It's more of it's going to be a computer virus. We haven't quite made it to where we can move it on over. Maybe if people get more like chips like I did just did next door and whatnot, I'm actually going to go home and work on that and see if I can do it. But yeah, it's going to be more about making those connections between human biology and malware and why it's actually a pretty cool topic. All right, so first we need to get some like foundation, some ground rules. I don't know you, you don't know me. So I'm going to make sure that you got some foundation so that we can make this interesting. So we have biological evolution and cultural evolution. Are we familiar? Cool, all right. So obviously biological evolution happens a lot slower. You know, that's traits and everything like that. It occurs at a very slow rate. And then cultural evolution can happen extremely rapidly. You know, there's fads happening, there's this and that, whatever. But there's a difference in the different types of evolution and I want you to keep that in mind. All right, so next we're going to talk about, we're going to bring it to a different level and talk about primary and secondary succession. So the primary succession is whenever there's like no soil, like soil may, and then there's, you know, it's a pioneering organism, it's just there, there's nothing else there, it's got no enemies, it's, you know, it's brand new. And, you know, the secondary succession is whenever we've really built up some stuff, you know, we've got it, we've established a city there now. We've established like people have to have jobs and trade and different things like that. So let's, so that's kind of, I want you to keep that in mind as well. All right, so the next thing we're going to talk about is we're going to get into the malware part of it. So I'm going a little faster over that, but I really want to talk about this really cool piece of malware whenever I get to it. So if you guys need me to slow down or stop, just raise your hand and be like, yo, I don't know what you're saying right now. All right, so the evolution of malware. So this is a chart that I actually got online at the RSA. That's wrong, but it actually does represent a pretty, it is a pretty good representation of the evolution of malware. So if we look over here, there's actually one other one that was formed in 1986. And that's going to be the brain malware. And that one actually, if you look at it, and you know what you're reading, it actually has the address, the phone number, like who it was and like everything about the malware. It was a very basic primary succession type of thing. Like computers were new, knew it, not really, but like malware was new and this got onto the computers and people were like, what is this? Like how did you get into my shit? Like what is this? And so people actually flew over to the Brain Computer Services Company and found out that it was an accident that they leaked some kind of software that somebody screwed up on and it wasn't meant to be a malware, but it was a malware, it was a spyware. And it got all over the United States and that's whenever people started using antivirus software is kind of. So if you look here, this is gonna be the biological evolution. If you look over here, we're gonna look at more the cultural evolution. So things really start speeding up around 2003. And then here we are. So where's the connection here? So on the top left, you're gonna see human biology. On the bottom right, you're gonna see a computer virus. All right, so first, there's an infection. We both have an infection, we both reproduce and we both spread things to others. Maybe I don't, I get tested, maybe you do. I don't know you. Like I said, you don't know me, I don't know you. But you spread things to others and then it repeats the process. Viruses want to stay alive. Now, here's where it gets interesting because I've listened to a lot of talks and I've done a lot of research on people that want to compare human biology and viruses. When a computer virus is not the same thing as a biological virus. It does not reproduce and try and make itself survive. It is not alive, right? Well, lately, there's been some changes and, but first let's look at the origin of viruses. So there's three different stages that I'm gonna talk about. I'm sure there's a lot more, but there's three main ones that I'm gonna talk about. So there's regressive evolution, which is parasitism. It's like, you know, the parasite started coming around. They're like, oh, I'm in this primary succession stage. I'm so popular. I'm like, I'm gonna get all my, I'm gonna get everything. You know, they lost a lot of functions though as they started phasing out and they retain only what they needed for a parasitic lifestyle. The malware equivalent of that is the brain malware. It was just out there. It really had no function. It wasn't gonna really replicate. It was just there and it was feeding off of whatever the computer it was infecting had. Then there's the cellular origins and that is viruses that are derived from the subcellular functional assemblies of macromolecules. So all in all, those are things that if you compare it to botnets, those are cell to cell and in malware it's bot to bot. So there's, if you can see, there's a lot of really good similarities between malware and human biology. And then there's independent entities, all right? These are the real advanced ones. These are the ones that started around the secondary succession, pretty strong. It's feeding off of what was already out there and it is wanting to live. It is a prebiotic self replicating molecule and it is not the dooku virus. It is not all this other stuff that was engineered to go on a computer or an operating system for an antivirus to just pick up its signature and it get blocked like the configure or something like that. That is not similar to that. But today I'm gonna talk to you about Frankenstein. Yeah, not the movie, not the monster, but Frankenstein the malware. And that is, Frankenstein is gonna be the first, the first, you can argue with me if you want to, but I've reverse engineered it. It is the first true replicating but mutating malware. It creates its own children that have a different DNA if you will and it also learns from what operating system and computer it's on. Now, there are three different Frankensteins out there. There's a Frankenstein that it was developed at the University of Texas. There's the, yes, this might not be, whatever. Don't call. There was the one that was built at the University of Texas that was bought by the United States Air Force. That's the good one that I'm gonna talk about. And then there's the most recent one that happened that people finally figured out how to do on June 19th that only infects the memory part of your computer. But the Frankenstein that we're gonna talk about is gonna be the one that was actually built by the University of Texas. Because that one is the one that uses artificial intelligence in order to get into your computer, read what antivirus software you have and then mold its children around being able to survive that antivirus software. It is also going to survive, it basically, all right. So it takes the blueprint of your computer. I'm trying to get this on technical. Is anybody, is everybody technical? Is anybody new in here? Okay, cool, cool, cool. So we'll just, all right, well, all right. I'm not trying to call you guys out or anything. But all right, so it takes the blueprint of, and it takes the blueprint of the computers that it's infecting, but it also has gadget sequences that antivirus software today really aren't detecting. And it is very behavior-based, which changes with every single computer that it's infecting because it wants to stay alive. It learns on its own. So once it is released out into the wild, it learns on its own. Now, because it's the Frankenstein malware, it is very easy for it to not need any kind of human interaction at all. So once it's out there, it's out there, okay. Now, what do we do about getting it off? Well, we don't really have anything right now to get it off. And that is why I'm talking to you today because it's gonna eventually get out there, whether I talk about it at DEF CON and tell all the bad hackers about it or not. It's gonna eventually come out there because they are perfecting it. The one that happened in June, 2019, I can send you guys a link to it. Let me know if you guys are actually, you wanna talk more technical about this. I can definitely answer those questions and get the emails going. But that one is made up of pieces of code from benign host programs. So it doesn't actually trigger any red flags as something foreign to the system. But not only that, but by looking like something that the computer trusts, it could even become whitelisted and it has become whitelisted with a lot of states. And it also, it gives it a really easy tunnel to get straight into the heart of an organization. And also with Frankenstein, the people that built it, and if you reverse engineer one, you're not gonna find the same one, but you can figure out how to reattach different arms to make it from ransomware and spyware and things like that to maybe something a little bit more malicious. And that's the really scary part of it because we don't have an AI, we don't really have a consistent AI antivirus software that we can utilize for something like this. And we are going into the AI world. Things your world and biology is merging with our world and malware. And that is why I think it is extremely important to have this make this connection with you guys and make this connection with you guys so that we can start really kind of combining our efforts, not just the cybersecurity people, but the people interested in human biology because the human biology, if you see and you understand what I was saying in this presentation, there's a lot of connections that can be made between the really scary stuff that's about to come out and human biology and how that has evolved as well with the cold viruses and everything like that. So where do we go from here? I mean, do we make vaccinations? You know, do computers now need vaccinations? Do they, like, what do they need? You know, the crucial aspect for any defense framework contains the ability to detect and attack before it reaches the target services and causes damage. But this has been whitelisted. The Frankenstein malware is being whitelisted, which is just devastating. If you guys can imagine this getting into the power grid, this getting into the Mariah Botnet network that is everywhere. It's on every CCTV, it's everywhere. It's in your laptops, it's everywhere, but it hasn't been activated yet. So imagine the Frankenstein malware getting injected into the cell of the Mariah Botnet, just like how the HIV virus gets injected into a cell, grows, becomes whatever, and then many months or years later, you find out, ooh, shit. That's kind of what this is, is Frankenstein can get into those bots and it can learn about everything that the Botnets are collecting data from and it can explode into your world. And I understand it looks like, it sounds like I'm a conspiracy theorist, I promise I'm not. I've really done the reverse engineering, the research in this. I've spent time in the basement with it. I've worked with the, I've actually got a sample from the United States Air Force on it and I was able to look at that one compared to the one in the world today. It's not the same. The one in the world today basically just goes to the, I wrote it, it goes to the memory of your computer and it'll send you a document based off of your calendars, based off of your emails, based off of everything else and it'll send you a document for more malicious activity to happen. Like if you're a recruiter, I was talking about this earlier, if you're a recruiter and it knows that you have meetings with all these people, you're getting resumes a lot of times in your email, it will send you Mark Davis Resume 2019 and you just open it up. These are very, very particular, very specific emails and very specific campaigns that this malware is able to do and I think it's really cool. So there's a lot of gaps in research and I think that as medical field people, I think you would appreciate that there is a need for more medical grade style research in cybersecurity with malware. Malware is the thing that's gonna shut down our power grids. It's gonna be the thing that shuts down our phones. We're gonna have to learn how to write a letter again. And it is a very real and it's a very scary threat that is starting and yes, it took several years for hackers to even figure out how to get it to go on to memory. From 2012 to 2019, people were trying to figure it out but I mean, five, 10 years from now with all the AI pushes and you know, because that's the buzzword today, with all the AI pushes, where is it gonna be in five years? Like is the actual malware that the US Air Force has going to be the next one in the wild? And we need to come together and research and come up with some shit because that's not gonna be a good time for anybody. If you thought the NSA was bad a few years ago, this one's gonna be watching your shit just as bad. So let's make some connections. If anybody has any questions, you wanna see, I actually recorded a video of me reverse engineering this malware, so if you'd like to see that, just contact me. I can give you the, I'll give you guys the YouTube link too, I'll post it on YouTube. Yeah, I'll post it on, I can post it on YouTube? Yeah, okay, cool. I had to talk to my company. I'll post it on YouTube so that everybody can see it and those that are really interested in malware and understand the code and stuff like that. If you have any questions, I love talking about this. It's my jam, so if you guys have any questions at all, feel free to ask me about it. What's up? There he goes. The samples are already public. The samples that I have played with, I'm probably not going to because my shit's monitored. So I'm probably not going to but I can definitely talk to you about it if anybody's interested in how to re-engineer one of those. We can definitely talk about it in an academic setting. For sure. Cool. Anybody else scared? Did I do shit? Was I shit just now? Did you guys have a good time? Okay, cool. And there's a lot of references. This isn't just like a conspiracy theory that I did. There's a shit ton of references. So yeah, I have a lot of links. A little tidbit, a little extra that I wanted to leave you guys with in case you weren't interested in my conversation. There is a smartphone out there that is made in Tokyo that is actually starting to be able to scan people's retinas and their skin to discover any kind of viruses and that's what their medical field is going to be like in the next few years. It's being perfected now. And it's what? No, no, no, no, no, no, no, but I mean, I find it interesting because now I want to hack the smartphone and try and put some malware on there saying that you're fine whenever you're my enemy. So it's very interesting to kind of like merge the two fields together and see what we can do to try and, you know, I'm kind of the good guy. So, you know, I do it for a good reason. But yeah, thank you guys. I appreciate it. If anybody has any questions about it, happy to go outside and talk to you about it or you guys can raise your hands real quick right now. You got five seconds, five. Oh, that's a super good question. Yeah, that's a really good question. So yeah, you just asked me and I'll just, I'll give you my email. It's talk2turtlesnap at gmail.com. So yeah, no spaces, no weird stuff. Just talk2turtlesnap at gmail.com. I appreciate you guys letting me talk about this and setting the record straight that there is a Frankenstein malware out there. It was driving my nuts. I appreciate it. All right, guys, I appreciate it. Thank you so much for listening and taking it all in. Thank you.