SecureOwl, to infosec

It's that time of year again - introducing T'was the night before the Breach, 2023 edition.

https://medium.com/@mike-sheward/twas-the-night-before-the-breach-2023-edition-e6f0d4123d96

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Friday! I hope the week was kind to you!

The Cisco Talos Intelligence Group researchers discovered a new remote access trojan () that they dubbed "SugarGh0st". The adversary was "targeting the Uzbekistan Ministry of Foreign Affairs and users in South Korean".

In one of the attacks, the adversary used a shortcut file with a double extension, which is a technique adversaries use to abuse the default settings of Windows, which is to hide the extensions, so the user may not suspect anything. Some of the capabilities include video and screen capture as well as the ability to clear tracks by deleting event logs. Check out the rest of the technical details and the second infection chain in the article! Enjoy and Happy Hunting!

New SugarGh0st RAT targets Uzbekistan government and South Korea
https://blog.talosintelligence.com/new-sugargh0st-rat/

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Thursday everyone!

I can't believe is starting on Monday! That means this is the last week to register for Cyborg Security's Threat Hunter training delivered by me! We will cover some resources that we can use for researching prior to our hunt, we will demonstrate how to extract key artifacts from an intel report and turn those artifacts into something useful, and then we will get into the data to hunt for evidence of malicious adversary behavior! It's going to be a fun time, good discussions, and a great chance to get some hands on experience hunting and pivoting through an investigation. I can't wait! Until then, Happy Hunting!

Registration ends on December 2nd, so don't miss out! Link below 👇 !
https://www.blackhat.com/eu-23/training/schedule/#beyond-iocs-how-to-effectively-threat-hunt-using-ttps-and-behaviors-virtual-32372

SecureOwl, to infosec

Securing Google Workspace - A Guide

A list of Google Workspace default settings, and how they should be set for improved security.

BTW - the worst Google Workspace default setting is in Google Groups, and if you use Google Workspace - I'd be pretty sure it's impacting you right now.

https://mike-sheward.medium.com/securing-google-workspace-a-guide-6cf82a5bbfda

kpwn, to infosec

The average user of https://cvecrowd.com sends about 9 HTTP requests to the web server.

On November 2nd, TWO MILLION requests were sent from three IP addresses in two hours.

The Anatomy of an Attack 🧵

SecureOwl, to infosec

InfoSec Diaries - Black Friday Special:

All Kindle editions of every story in the series are FREE to download today!

Check out https://www.infosecdiaries.com for more info about each story based on real life information security tales.

SecureOwl, to infosec

InfoSec Diaries - Black Friday Special:

All Kindle editions of every story in the series are FREE to download today!

Check out https://www.infosecdiaries.com for more info about each story based on real life information security tales.

SecureOwl, to infosec

Drown out the sounds of your family discussing politics and other crap this Thanksgiving with the relative calm of real life information security stories!

The InfoSec Diaries on Audiobook, perfect for pretending like you’re on an urgent work call so you can’t talk to uncle Phil about computers:

https://www.audible.com/author/Mike-Sheward/B00JKND75S

SecureOwl, to infosec

Fake job scams are through the roof at the moment, for obvious reasons.

Not only do they suck because they are generally a terrible way to scam people who are having an especially hard time, but they also place employees of the impersonated companies at risk.

The Blue Team Diaries story, Recruit - is a tale about the impact of such a scam, based on real world events of course. You can find it on Kindle (Unlimted members download for free) and Audible. It's also part of the Blue Team Diaries paperback, which you can find at most places books are sold.

https://www.amazon.com/Blue-Team-Diaries-Mike-Sheward-ebook/dp/B09PKPQRP6

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Wednesday everyone!

As planned (but a little later than I would have wanted) comes Part 2 of my posts related to the Palo Alto Networks Unit 42 article on . In my first installment, I covered the TTPs and behaviors of the APT that were presented by the team and in this post I am going to cover the TTPs and behaviors observed by the first wiper they discussed, the . Enjoy and Happy Hunting!

Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors
https://unit42.paloaltonetworks.com/agonizing-serpens-targets-israeli-tech-higher-ed-sectors/#post-131008-_gpm29t634ood

Cyborg Security's Community Edition Hunt Package to get you started!
Wevtutil Cleared Log
https://hunter.cyborgsecurity.io/research/hunt-package/7ceada06-54e2-4b44-9dca-b4e8d4ba401d

SecureOwl, to infosec

Securing Google Workspace - A Guide

Google Workspace comes with a bunch of great security features, but not all of them are enabled by default.

So - this guide lists several of the default security-related settings in Google Workspace, and how I recommend adjusting them to provide a decent starting point.

https://mike-sheward.medium.com/securing-google-workspace-a-guide-6cf82a5bbfda

SecureOwl, (edited ) to infosec

As promised, here is my guide to the default Google Workspace settings that should be changed:

https://mike-sheward.medium.com/securing-google-workspace-a-guide-6cf82a5bbfda

SecureOwl, to infosec

Learn Pen Testing, Blue Teaming and Digital Forensics

A collection of short stories, each episode in each series is based on a real-life story from the field.

Available on Kindle, Paperback and Audiobook

Learn more @ https://infosecdiaries.com

SecureOwl, to infosec
SecureOwl, to infosec

Looking forward to speaking at SecureWorld Seattle on Wednesday!

More details: https://events.secureworld.io/agenda/seattle-wa-2023/

Hope to see you there!

LeeArchinal, to Black_cats
@LeeArchinal@ioc.exchange avatar

Happy Friday everyone!

The NCC Group has created a series that I look forward to finishing, titled "Unveiling the Dark Side: A Deep Dive into Active Ransomware Families". The first installment covers the (a.k.a. ) and an incident that they observed that it was involved in that included new service and new accounts being created, and data being staged and believed to be exfiltrated. If you like technical reports like I do, this is one you don't want to miss! Enjoy and Happy Hunting!

Unveiling the Dark Side: A Deep Dive into Active Ransomware Families
https://research.nccgroup.com/2023/10/31/unveiling-the-dark-side-a-deep-dive-into-active-ransomware-families/

LeeArchinal,
@LeeArchinal@ioc.exchange avatar

Notable MITRE ATT&CK TTPs (Thanks to the NCC Threat Research Team)
TA0002 - Execution
T1569.002 - System Services: Service Execution

TA0003 - Persistence
T1136.001 - Create Account: Local Account
T1543.003 - Create or Modify System Process: Windows Service

TA0005 - Defense Evasion
T1070.001 - Indicator Removal: Clear Windows Event Logs
T1070.004 - Indicator Removal: File Deletion

TA0006 - Credential Access
T1003 - OS Credential Dumping
T1003.001 - OS Credential Dumping: LSASS Memory

TA0007 - Discovery
T1033 - System Owner/User Discovery
T1082 - System Information Discovery

TA0009 - Collection
T1074.001 - Data Staged: Local Data Staging
T1560.001 - Archive Collected Data: Archive via Utility

TA0040 - Impact
T1486 - Data Encrypted for Impact

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Wednesday!

📢 Excited for ? Don't miss my in-depth training session "Beyond IOCs: How to Effectively Threat Hunt using TTPs and Behaviors". Dive deep into cybersecurity models, tools, methodologies, and get hands-on with interactive threat hunting exercises. Master the art of operationalizing intel and presenting findings! 🔍🛡️

Normal registration ends Nov 17th!
https://www.blackhat.com/eu-23/training/schedule/#beyond-iocs-how-to-effectively-threat-hunt-using-ttps-and-behaviors-virtual-32372

SecureOwl, to infosec

A new review on a Blue Team Diaries audiobook that makes me happy!

You can find all the deets at https://infosecdiaries.com

SecureOwl, to infosec

Learn Pen Testing, Blue Teaming and Digital Forensics

A collection of short stories, each episode in each series is based on a real-life story from the field.

Available on Kindle, Paperback and Audiobook

https://infosecdiaries.com

s_mcleod, to security

Why are so many enterprise security teams so incredibly inept when it comes to basic communication skills and the ability to work together towards a common goal?

Any team / business unit can be bad at these things (and often are in the "enterprise") but the problem seems especially prevalent with security teams.

And no, branding your teams / culture as devsecops does not fix the problem.

SecureOwl, to infosec

If you’ve ever wondered what the Infosec Diaries sound like on audiobook, here’s a preview of Blue Team Diaries: Mixed Up -

https://youtu.be/LNZARwXV24s

Find out more about the series at https://infosecdiaries.com

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Tuesday everyone!

With the recent activity reported by the CERT-UA researchers, we focus on the apt known as the Team, or (UAC-0165 as tracked by the Ukraine CERT). They recently targeted "at least 11 telecommunications providers" and conducted scans, installed backdoors, and cleared their tracks.

Features of destructive cyberattacks against Ukrainian providers (CERT-UA#7627)
https://cert.gov.ua/article/6123309

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Thursday everyone!

Normally I post something about a threat intel report but I have been reading the Microsoft Digital Defense Report for 2023 and there is just too much to post. That being said, I am going to share some of the numbers Microsoft presented and my thoughts on them. Let's start with ransomware:

📊 80-90% of all successful ransomware compromises originate from unmanaged devices.
📊 70% of organizations encountering human-operated ransomware had fewer than 500 employees.
📊 13% of human-operated ransomware attacks that moved into the ransom phase included some form of data exfiltration.
📈 Human-operated ransomware attacks are up more than 200%

infoseclogger, to infosec


I have a weird issue and I need some help. I am dealing with an adversary who is impersonating our brand, but has now hidden the impersonation behind a login page as a way to stop takedown efforts. In order to register, they don't want an e-mail, they want a phone number in their country code to which a verification text message is sent.

Is there an app or service like the google phone service that can let me send or receive text messages from a number in another country?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • Leos
  • kavyap
  • DreamBathrooms
  • Durango
  • GTA5RPClips
  • normalnudes
  • magazineikmin
  • khanakhh
  • thenastyranch
  • rosin
  • Youngstown
  • slotface
  • InstantRegret
  • everett
  • JUstTest
  • ngwrru68w68
  • ethstaker
  • modclub
  • anitta
  • tacticalgear
  • osvaldo12
  • mdbf
  • cubers
  • megavids
  • provamag3
  • cisconetworking
  • tester
  • lostlight
  • All magazines