simontsui, to random

Sekoia tracked and monitored adversary C2 infrastructures set up and used by lucrative and state-sponsored intrusion sets to carry out malicious cyber activities. Their analysts identified more than 85,000 IP addresses used as C2 servers in 2023, an increase of more than 30% compared to 2022. (No IOC listed.)

The democratisation of phishing kits, particularly those capable of relaying Multi-Factor Authentication (MFA) challenges, has become a dominant trend. Phishing-as-a-Service platforms like EvilProxy and NakedPages have lowered the technical barriers for conducting adversary-in-the-middle attacks, with a notable rise in Microsoft 365 account compromises observed in the latter half of the year.

🔗 https://blog.sekoia.io/adversary-c2-infrastructures-tracked-in-2023/

jann, (edited ) to Synology
@jann@twit.social avatar

You are KIDDING ME, ! With THIS cost I could buy HOW MANY hard drives and new Synology units - and do it myself and NOT have the ongoing cost of services! @siracusa @caseyliss

julianferdinand, to github

Just published a report deep diving into the frequent abuse of 's services by cybercriminals and for malicious infrastructure schemes, such as payload delivery, exfiltration, , as well as other schemes. Check it out: https://www.recordedfuture.com/flying-under-the-radar-abusing-github-malicious-infrastructure

SophosXOps, to random

Sophos X-Ops is raising the alarm to the industry, warning that threat actors appear to be using requests or complaints as a lure to convince front-desk workers to infect their own computers with password stealing . 1/

https://news.sophos.com/en-us/2023/12/19/inhospitality-malspam-campaign-targets-hotel-industry/

SophosXOps,
raptor, to random

Fresh on the @hnsec blog: a new series on customizing by @BishopFox, written by my colleague Alessandro Iandoli

https://security.humanativaspa.it/tag/sliver/

Enjoy!

r1cksec, to infosec

DuckDuckGo's image proxy can be used as a command and control channel🕵️‍♂️​

https://nopcorn.github.io/2023/09/25/duckduckgo-as-c2

A suitable proof of concept tool has also been published:

https://github.com/nopcorn/DuckDuckC2

SnoopJ, to random
@SnoopJ@hachyderm.io avatar

Getting around to reading the 'new' "Absolute minimum" blog post about dev knowledge about , and I assume parts of it are going to rub me the wrong way

SnoopJ,
@SnoopJ@hachyderm.io avatar

I am nearly sure that the article is wrong in saying that editing a ZWJ sequence addressing individual codepoints is incorrect behavior. I admit that the example of backspacing over a "family" sequence is going to be confusing to users, but to say it's wrong is just muddying the waters IMO.

The relevant specification of behavior is UTS-51 ("Unicode Emoji"), and the relevant conformance requirement is C2:

https://unicode.org/reports/tr51/#C2

C2b does encourage indivisible sequences, but is NOT required

thehappydinoa, to random
const, to infosec

Just released some research and a proof-of-concept tool on leveraging DuckDuckGo’s image proxy as a C2 channel. Was a quick side project that led in an interesting direction.

https://nopcorn.github.io/2023/09/25/duckduckgo-as-c2

const,

…and the accompanying github repo if you’re the TLDR type! DuckDuckC2 is a proof of concept C2 using DuckDuckGo’s image proxy service.

https://github.com/nopcorn/DuckDuckC2

SophosXOps, to Citrix

Sophos X-Ops is currently tracking a campaign by threat actors targeting unpatched systems exposed to the internet. Our data indicates strong similarity between using CVE-2023-3519 delivering and and previous attacks using a number of the same .

SophosXOps,

Later stages of that attack included behaviors such as:

thejapantimes, to Japan
@thejapantimes@mastodon.social avatar
jbsegal, to boston

I never made an , so:
(MA)-ish area geek (), working in academia.
()()( )
and (UK) canal obsessive.
fan. ().
Not going anywhere near Line, despite being too damned ensconced in FB. Trying to quit Reddit for Lemmy.

Norobiik, to random
@Norobiik@noc.social avatar

I just knew our kababayan would be there. The only question was how many 😨

The Philippine government is preparing to evacuate from , a country caught in a deadly power struggle between the military and paramilitary groups. President Ferdinand Marcos Jr. has requested more information to ensure the safety of around 300 Filipinos in the African country.

Gov't working to evacuate Filipinos from conflict-hit |
https://www.rappler.com/nation/overseas-filipinos/marcos-says-government-working-evacuate-filipinos-sudan/

Norobiik,
@Norobiik@noc.social avatar

The 3rd plane is a aerial refueling plane. The rescue team from is coming in fully prepared. They're throwing in 370 personnel from the Ground and Air Self-Defense forces.

source: https://mainichi.jp/english/articles/20230422/p2g/00m/0in/015000c

"The three planes, including a and transport aircraft, will be stationed in , a country in the about 1,200 kilometers southeast of , the capital of , while the ministry and assess the situation.. "

https://english.kyodonews.net/news/2023/04/b5ee2b61b9fd-japan-sdf-planes-arrive-in-djibouti-to-prepare-for-sudan-evacuation.html

Norobiik,
@Norobiik@noc.social avatar

Footnote: The Kawasaki transport aircraft is designed to carry heavy equipment. A truck crane or even a wheeled tank destroyer. But my guess is that it's probably carrying this 👇 |

sources:
https://en.m.wikipedia.org/wiki/Kawasaki_C-2
https://en.m.wikipedia.org/wiki/Mitsubishi_H-60

mle, to Cybersecurity

🌊 HI! I'm a security researcher interested in weird things on the Internet. In particular, I love following rabbit holes around phishing emails and infrastructure, C2s, and botnets.
I got my start in tech in data science, where I helped colleagues find users who were doing "weird" and "interesting" things with our company's software. They wanted to find users who were pushing the boundaries of the software, not doing nefarious things, necessarily.
TL;DR I've spent most of my career looking for weird stuff in data.
Now, I'm especially interested in applications of data science methods–including but NOT limited to AI/ML–to problems in the infosec space.
Excited to see the community here and get to know others with similar interests!

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • tacticalgear
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • lostlight
  • All magazines