acdha, to random
@acdha@code4lib.social avatar

Reading through some analysis, I’m now curious whether anyone has tested a modified version to see if any endpoint security tools would have caught this. This could have been incredibly damaging and it seems like some of those tricks should have raised behavioral red flags.

https://gist.github.com/smx-smx/a6112d54777845d389bd7126d6e9f504

acdha,
@acdha@code4lib.social avatar

Looking through various tools, I see mostly no mention except for two confirmations that it wouldn't have been blocked by their products until post-disclosure rules were added.

Sysdig: custom post-disclosure rules https://sysdig.com/blog/cve-2024-3094-detecting-the-sshd-backdoor-in-xz-utils/

Palo Alto: custom rules, somewhat vague claim that one product could “help protect against post-exploitation activities” https://unit42.paloaltonetworks.com/threat-brief-xz-utils-cve-2024-3094/

linuxmagazine, to security
@linuxmagazine@fosstodon.org avatar

Is someone listening in on your typing? Chris Binnie shows you how acoustic keyloggers work https://www.linux-magazine.com/Issues/2024/278/Acoustic-Keyloggers

nono2357, to random
nono2357, to random
BishopFox, to random

More observations: Bringing the bypasses! Just in case won't let you send telemetry traffic into the void.

BishopFox, to random

Local zones take first priority in . Make sure your doesn't depend entirely on name resolution... (thanks to Jim Sykora and Jake Hildreth for the great talk!) @WWHackinFest

F0rm4t, to microsoft Italian

𝗗𝗲𝗳𝗲𝗻𝗱𝗶𝗻𝗴 𝗻𝗲𝘄 𝘃𝗲𝗰𝘁𝗼𝗿𝘀: 𝗧𝗵𝗿𝗲𝗮𝘁 𝗮𝗰𝘁𝗼𝗿𝘀 𝗮𝘁𝘁𝗲𝗺𝗽𝘁 𝗦𝗤𝗟 𝗦𝗲𝗿𝘃𝗲𝗿 𝘁𝗼 𝗰𝗹𝗼𝘂𝗱 𝗹𝗮𝘁𝗲𝗿𝗮𝗹 𝗺𝗼𝘃𝗲𝗺𝗲𝗻𝘁

Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.

Attackers are now attempting to move laterally into cloud environments via SQL Server instances—a method previously seen in VMs and Kubernetes clusters but not in SQL Server.

https://www.microsoft.com/en-us/security/blog/2023/10/03/defending-new-vectors-threat-actors-attempt-sql-server-to-cloud-lateral-movement/

#microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc

acrypthash, to security

I really enjoyed this write up about importing python modules dynamically in memory to avoid detection from EDRs.

https://www.naksyn.com/edr%20evasion/2022/09/01/operating-into-EDRs-blindspot.html

gleeda, to random

In light of all the news about qakbot being dismantled, it’s time to let people know about something we did at @huntress :
@JohnHammond discusses the qakbot “vaccine” we used to prevent the spread of qakbot in our customer base:

https://www.huntress.com/blog/qakbot-malware-takedown-and-defending-forward

r1cksec, to infosec

Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver

https://github.com/ZeroMemoryEx/Terminator

dantemercurio, to infosec
@dantemercurio@ioc.exchange avatar

system with capability and automated response across a vendor agnostic structure, shares threat info to all other clients, can quarantine any suspected client on the endpoint as well as any L2 device while opening a help desk ticket for review.

Marketing: That's XDR!

EDR client that can send a simple block IP command to a firewall

Marketing: That's ALSO XDR!

SophosXOps, to random

Hey there. @threatresearch here again, taking over the X-Ops Mastadon to talk about some research we posted this week.

We stumbled upon a malicious tool earlier this year, while our EDR and incident response teams were called in to perform postmortem investigations of ransomware attacks.

While reviewing logs, we found that the threat actors had used a custom-designed we're calling as a way to terminate the agent and endpoint security software the target had installed.

https://news.sophos.com/en-us/2023/04/19/aukill-edr-killer-malware-abuses-process-explorer-driver

sensepost, to random

A post by Reino about how leaving Bitlocker in “Suspended” state will let you recover the keys for decryption, after which the laptop can be virtualised and messed with without the SOC knowing about it, even when they’re watching closely.

https://sensepost.com/blog/2023/from-bitlocker-suspended-to-virtual-machine/

#bitlocker #virtualisation #edr #hacking #sensepost

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • cisconetworking
  • khanakhh
  • mdbf
  • magazineikmin
  • modclub
  • InstantRegret
  • rosin
  • Youngstown
  • slotface
  • Durango
  • tacticalgear
  • megavids
  • ngwrru68w68
  • everett
  • tester
  • cubers
  • normalnudes
  • thenastyranch
  • osvaldo12
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • lostlight
  • All magazines