aijlnu, to random German

Jobsuche aufgrund Umzug: Wo möchte Mensch denn im Raum Karlsruhe im Bereich IT Security oder IT Infrastruktur arbeiten? Nicht-offensichtliche Geheimtipps, dringendes Abraten…?

LeeArchinal, to Black_cats
@LeeArchinal@ioc.exchange avatar

Happy Friday everyone!

The NCC Group has created a series that I look forward to finishing, titled "Unveiling the Dark Side: A Deep Dive into Active Ransomware Families". The first installment covers the (a.k.a. ) and an incident that they observed that it was involved in that included new service and new accounts being created, and data being staged and believed to be exfiltrated. If you like technical reports like I do, this is one you don't want to miss! Enjoy and Happy Hunting!

Unveiling the Dark Side: A Deep Dive into Active Ransomware Families
https://research.nccgroup.com/2023/10/31/unveiling-the-dark-side-a-deep-dive-into-active-ransomware-families/

LeeArchinal,
@LeeArchinal@ioc.exchange avatar

Notable MITRE ATT&CK TTPs (Thanks to the NCC Threat Research Team)
TA0002 - Execution
T1569.002 - System Services: Service Execution

TA0003 - Persistence
T1136.001 - Create Account: Local Account
T1543.003 - Create or Modify System Process: Windows Service

TA0005 - Defense Evasion
T1070.001 - Indicator Removal: Clear Windows Event Logs
T1070.004 - Indicator Removal: File Deletion

TA0006 - Credential Access
T1003 - OS Credential Dumping
T1003.001 - OS Credential Dumping: LSASS Memory

TA0007 - Discovery
T1033 - System Owner/User Discovery
T1082 - System Information Discovery

TA0009 - Collection
T1074.001 - Data Staged: Local Data Staging
T1560.001 - Archive Collected Data: Archive via Utility

TA0040 - Impact
T1486 - Data Encrypted for Impact

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Wednesday!

📢 Excited for ? Don't miss my in-depth training session "Beyond IOCs: How to Effectively Threat Hunt using TTPs and Behaviors". Dive deep into cybersecurity models, tools, methodologies, and get hands-on with interactive threat hunting exercises. Master the art of operationalizing intel and presenting findings! 🔍🛡️

Normal registration ends Nov 17th!
https://www.blackhat.com/eu-23/training/schedule/#beyond-iocs-how-to-effectively-threat-hunt-using-ttps-and-behaviors-virtual-32372

scy, to random
@scy@chaos.social avatar

Well here's a free idea for you:

With people often copy-pasting command lines from the internet without thoroughly reading them, it's already possible to have them paste something they don't fully understand.

But what if the font you were using on the website that contains the command had some of its characters swapped in a clever way, so that it looked like a certain command, but when copied, contained a slightly different, malicious command?

heiseonline, to security German

Missing Link: Welche Länder und Branchen von der MOVEit-Lücke betroffen sind

Die Opferzahlen bei Privatpersonen und Firmen steigen auch Monate nach der Tat weiter an. Untersuchungen zum Ausmaß des Angriffs laufen weiter.

https://www.heise.de/hintergrund/Missing-Link-Welche-Laender-und-Branchen-von-der-MOVEit-Luecke-betroffen-sind-9347621.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege

Andreas_Sturm, (edited )
@Andreas_Sturm@mastodon.social avatar

@heiseonline "BBC warnt Mitarbeiter, dass Personalausweisnr., Geburtsdaten, Privatadressen, Sozialversicherungsnr. gestohlen wurden".

Es scheint vollkommen egal, wie sehr man versucht, seine Daten selbst zu schützen, so lange Organisationen sammelwütig & unfähig deine Identität auf dem Präsentierteller anbieten. Vlt. gehören einige Daten einfach nicht in Systeme mit Verbindung ins Internet, gescheit verschlüsselt & maximal zugriffsbeschränkt.

wurzelmann, to privacy German

Ich habe mich erstmals durch die "Empfehlungsecke" von @kuketzblog durch geklickt und finde, dass das eine gut kuratierte und übersichtliche Liste ist.

Gute Empfehlungen für Apps, Zahlungsverkehr im Internet und vieles mehr, schaut sie euch mal an, ist sicher auch gut zum Weiterleiten an Leute, die Tipps brauchen.

https://www.kuketz-blog.de/empfehlungsecke/

rettichschnidi, to random
@rettichschnidi@swiss.social avatar

https://secureft.sanitas.com/

"Vorgeschlagenes Kennwort: 7n3mnu" 🙃

Manuell darf man auch ein selbst gewähltes Passwort nutzen.

Bin mir unsicher ob das dumm oder genial ist.

benjaoming, to random
@benjaoming@social.data.coop avatar

I noticed this "Tech-Tipp" in the Hamburg S-bahn. Nice to see some good solid public service information on the trains.

The text is an encouragement to use VLC player since it can play practically any audio and video format and is available for all platforms.

That's what these announcement screens should be used for 💯

SebastianM6L,
@SebastianM6L@mastodon.social avatar

@benjaoming that's cool.
They could also inform about basic . Why strong passwords and MFA is important. And why you should not use the same password for all services.

It's crazy how uninformed the masses are. 😲

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Tuesday everyone!

With the recent activity reported by the CERT-UA researchers, we focus on the apt known as the Team, or (UAC-0165 as tracked by the Ukraine CERT). They recently targeted "at least 11 telecommunications providers" and conducted scans, installed backdoors, and cleared their tracks.

Features of destructive cyberattacks against Ukrainian providers (CERT-UA#7627)
https://cert.gov.ua/article/6123309

janriemer, to LLMs

/s Oh great...thanks to we now have an Top 10 for Large Language Model Applications:

https://owasp.org/www-project-top-10-for-large-language-model-applications/

"The OWASP Top 10 for Large Language Model Applications project aims to educate developers, designers, architects, managers, and organizations about the potential security risks when deploying and managing Large Language Models (LLMs)."

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Thursday everyone!

Normally I post something about a threat intel report but I have been reading the Microsoft Digital Defense Report for 2023 and there is just too much to post. That being said, I am going to share some of the numbers Microsoft presented and my thoughts on them. Let's start with ransomware:

📊 80-90% of all successful ransomware compromises originate from unmanaged devices.
📊 70% of organizations encountering human-operated ransomware had fewer than 500 employees.
📊 13% of human-operated ransomware attacks that moved into the ransom phase included some form of data exfiltration.
📈 Human-operated ransomware attacks are up more than 200%

bsi, to IT German
@bsi@social.bund.de avatar

Wusstet ihr, dass es auch spezielle Songs für die einzelnen Betriebssysteme gibt? Zum Beispiel Van Morrisons „Cleaning Windows“!
Ja, wir hören schon auf ... außer, ihr habt noch ein paar Songs für uns? 👀

balkonsolar, to random German
@balkonsolar@freiburg.social avatar

Experten der @HackerGeno haben sich die Datenübermittlung an die von genau angeschaut.

Sie waren in der Lage aus der Ferne den zu drosseln, Namen der umgebenden WLANs auszulesen und den Inselschutz remote abzuschalten.

Auf https://balkon.solar/deye berichten sie über die Probleme und rufen auf beim Betatest einer Vertrauenswürdigen cloud mitzumachen.

@HonkHase @heisec

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy everyone!

The Kaspersky researchers provide details on not one, not two, but THREE pieces of malware! They cover the (a crypto/loader), (a stealer), and (an Android banking trojan) and provide insight on their TTPs and behaviors. Plus, you get the links to the reports they produced! Enjoy and Happy Hunting!

A cryptor, a stealer and a banking trojan
https://securelist.com/crimeware-report-asmcrypt-loader-lumma-stealer-zanubis-banker/110512/

newstik, to security

Signs for bad IT security in a company:
They require HTML in emails relevant to IT security.
They force users to change ever so often.
They claim to follow "best practices".

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Good day everyone!

The ESET Research team discovered a sophisticated backdoor that contains multiple components and doesn't act like your normal malware with C2 communication. The backdoor consists of an Executor and Orchestrator. The Executor appears to act more like a middle man for the Orchestrator while the Orchestrator is responsible for actually running the commands from the C2 server. Enjoy this highly-technical article and Happy Hunting!

Stealth Falcon preying over Middle Eastern skies with Deadglyph
https://www.welivesecurity.com/en/eset-research/stealth-falcon-preying-middle-eastern-skies-deadglyph/

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

I hope everyone is having a good weekend!

The Palo Alto Networks Unit 42 research team discovered some activity that they attributed to a very stealthy and rarely seen APT, . They target a diverse group of industries but use tools like , , and but also used the Potato Suite that was seen as JuicyPotato.exe (who can't appreciate that?!). This was a great weekend read and I hope you all enjoy it as much as I did! Happy Hunting!

Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government
https://unit42.paloaltonetworks.com/rare-possible-gelsemium-attack-targets-se-asia/

pentagrid, to VintageOSes

We analysed the security of a (the operating system running also on NASA's Curiosity mars rover) embedded device and found a critical vulnerability in the function: https://www.pentagrid.ch/en/blog/wind-river-vxworks-tarextract-directory-traversal-vulnerability/

mr_phrazer, to Cybersecurity

🎉 I am honored to be presenting at the conference on October 24, 2023! 🎉

🔍 Talk Title: "Unveiling Malicious Behavior in Unknown Binaries"

In this presentation, we will:

🔑 Dive deep into strategies for extracting malicious behaviors in unknown binaries.

🛡 Cover tactics from fundamental signature-based checks, string analysis, and packer detection to advanced heuristics.

🌐 Discuss identifying Command and Control (C2) communication and decryption routines in malware.

🚀 With the rise of sophisticated malware, traditional strategies often fall short. We will introduce advanced techniques and heuristics to navigate and analyze complex binary files.

📌 For more details and to register, visit: https://lnkd.in/eTMvGrhi

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Sunday!

The Intel 471 team provides their findings of the loader as it makes its comeback after a two month break. Taking the place of the (the source code was leaked when the leak occurred). The BumbleBee loader has been associated with distributing ransomware and is currently being used by multiple threat actors. My favorite part of this article though (and not surprising) is all the MITRE ATT&CK mappings that provide all the a place to start looking, so thank you for that team! I hope you all enjoy and Happy Hunting!

Bumblebee Loader Resurfaces in New Campaign
https://intel471.com/blog/bumblebee-loader-resurfaces-in-new-campaign

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Follow the Check Point Software Technologies Ltd research team as they take a deep dive into the campaign they observed that targeted over 40 companies in Colombia. What started with a phishing email led to the RAT which provides the adversaries with full control over the infected computer. Enjoy and Happy Hunting!

GUARDING AGAINST THE UNSEEN: INVESTIGATING A STEALTHY REMCOS MALWARE ATTACK ON COLOMBIAN FIRMS
https://research.checkpoint.com/2023/guarding-against-the-unseen-investigating-a-stealthy-remcos-malware-attack-on-colombian-firms/#single-post

MITRE ATT&CK TTPs (but not all! Feel free to add your input in the comments!):
TA0001 - Initial Access
T1566.001 - Phishing: Spearphishing Attachment

TA0002 - Execution
T1204.002 - User Execution: Malicious File
T1059.001 - Command and Scripting Interpreter: PowerShell
T1059.003 - Command and Scripting Interpreter: Windows Command Shell

TA0005 - Defense Evasion
T1036.007 - Masquerading: Double File Extension

kubikpixel, to aitools
@kubikpixel@chaos.social avatar

11 Password Cracker Tools (Password Hacking Software 2023)

Read this comprehensive review and comparison of the top Password Cracking Tools to select the Best Password Cracker for your requirements:

🔓 https://www.softwaretestinghelp.com/password-cracker-tools/

--

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Researchers from Kaspersky's team takes a deep-dive into an "Evil Telegram" doppelgänger that is targeting Chinese users. At first the app looks benign and non-malicious until they started digging into the code. They found some functions that were designed to gather information of the contacts and access to the phone of the victim but also contains a function to gather messages and upload them to a command and control server that the adversary runs! Enjoy and Happy Hunting!

Evil Telegram doppelganger attacks Chinese users
https://securelist.com/trojanized-telegram-mod-attacking-chinese-users/110482/

LeeArchinal, to Powershell
@LeeArchinal@ioc.exchange avatar

Good day everyone! The Microsoft Threat Intelligence team has discovered activity from a group known as . They are a nation-state group from China that targeted organizations in Taiwan. While the group leverages tools that are commonly used, like , , and , they also rely on abusing , or Living-off-the-land binaries and scripts (tools that exist and come with the native operating system). Some of their TTPs include using registry key modification for persistence, using , , or to download tools, and accessing process memory and Security Account Manager registry hive for credential access. This is a great article that not only provides high-level details but it provides a starting point for any organization to start threat hunting by using the technical details provided! Enjoy your weekend and !

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • khanakhh
  • magazineikmin
  • thenastyranch
  • Youngstown
  • mdbf
  • rosin
  • slotface
  • InstantRegret
  • tester
  • cubers
  • kavyap
  • tacticalgear
  • DreamBathrooms
  • anitta
  • everett
  • ngwrru68w68
  • Durango
  • modclub
  • ethstaker
  • normalnudes
  • cisconetworking
  • osvaldo12
  • GTA5RPClips
  • Leos
  • megavids
  • provamag3
  • lostlight
  • All magazines