LeeArchinal, to infosec
@LeeArchinal@ioc.exchange avatar

The known as strikes again, this time targeting think tanks, academia, and media organizations with a social engineering. The goal? Stealing Google and subscription credentials of a news and analysis service that focuses on North Korea. Enjoy and Happy Hunting!

Link in the comments!

This one is a little different. In this article, SentinelLabs mentioned ReconShark being used. Can you provide me with any TTPs that are associated with that ?

TA0001 - Initial Access
T1566.002 - Phishing: Spearphishing Link
T1566.001 - Phishing: Spearphishing File

TA0002 - Execution
T1204.001 - User Execution: Malicious Link
T1204.002 - User Execution: Malicious File

TA0006 - Credential Access
T1056.003 - Input Capture: Web Portal Capture

ReconShark TTPs:
Here is your chance to shine! Let me know what TTPs are associated with this malware!

Malicious Google Docs site (from source)

bsi, to random German
@bsi@social.bund.de avatar

Wer kennt es nicht? Der USB-Stick hat nur Schokoladenseiten. 🍫

Quokka, to random

Love it when the big boss has a massive problem with how we're storing something because it's a security risk and probably puts us in dodgy territory contractually. And I get the opportunity to say "I said we shouldn't, and I've been saying that for months at every opportunity".

LeeArchinal, to infosec
@LeeArchinal@ioc.exchange avatar

Happy Tuesday everyone! is the topic of today's , specifically ThreatMon takes a deep-dive into the malware, which is a remote access trojan (RAT). Enjoy and Happy Hunting!

Link to article in the comments!

AS usual I am going to leave one of the MITRE ATT&CK blank. I would like to see if any of you that see this can help FILL in that blank! If so, leave your thoughts in the comments OR send me a DM!

Notable MITRE ATT&CK TTPs:
TA0007 - Discovery
T1087 - Account Discovery
T1083 - File and Directory Discovery
T1018 - Remote System Discovery
T1082 - System Information Discovery

TA0009 - Collection
T[What technique covers the threat actor capturing information under the TEMP folder?] - Good luck!

TA0011 - Command And Control
T1071.001 - Application Layer Protocol: Web Protocols

TA0002 - Execution
T1059.003 - Command and Scripting Interpreter: Windows Command Shell

HINT HINT (from source)

chetwisniewski, to infosec
@chetwisniewski@securitycafe.ca avatar

The best way to solve most problems in security and privacy are not always conventional methods, yet people only seek/adopt/purchase things they are already familiar with that are likely to fail them due to innovation on the behalf of those seeking to exploit us. Those of us who seek to make a larger impact must find ways of downplaying our innovative solutions and packaging them up as advancements of the old ways, even when untrue.

bazcurtis,
@bazcurtis@mastodon.social avatar

@chetwisniewski Too many IT departments, big and small can’t do the basics. Not that they don’t want to, they can’t. No inventory tools, no patching tools outside of WSUS etc. They are sitting ducks to one simple thing going wrong.

It is like eating badly, you will get away with it for a while, but in the end it will not have a happy ending.

bsi, to random German
@bsi@social.bund.de avatar

Heute gibt es eine versteckte Botschaft für euch ... na, was steht in der Sprechblase? 🤓

veit, to programming German
@veit@mastodon.social avatar

“PyPI new user and new project registrations temporarily suspended.”
https://status.python.org/incidents/qy2t9mjjcc7g

EC_DIGIT, to random
@EC_DIGIT@social.network.europa.eu avatar

Any big plans for the weekend? 🤨

👩‍💻 How about finally applying for a new job?

🕵️‍♂️ If is your game, check out our new and join .

Find out more & apply 👉 https://europa.eu/!JFHHDg

bsi, to random German
@bsi@social.bund.de avatar

Taggt jemanden, der den höchsten Ping hat. 😋

bsi, to infosec German
@bsi@social.bund.de avatar

Im Internet müssen wir uns oft erinnern, dass nicht alles echt ist, was wir sehen. Insbesondere bei sogenannten Deepfakes werden wir leicht getäuscht. In unserem Beitrag stellen wir euch eine Methode namens Face Swapping vor.

mullana, to random
@mullana@chaos.social avatar

[EN] We have our @rosenpass strategy meeting this weekend and I don’t have much to contribute to the current topic, so I found something else to do! 😁

[DE] Dieses Wochenende ist Strategie-Meeting und ich habe zum aktuellen Thema nicht viel beizutragen, deshalb habe ich mir eine andere Beschäftigung gesucht! 😁

afisch, to random German
Decypher2, to infosec

Every budding teen (and adult) in the country needs to learn this ASAP. I've done dozens of presentations at High Schools here in Ottawa and this is a common activity. Among a litany of other things, simply sharing a non-consensual intimate image might land you on the National Sex Offender Registry. https://www.canada.ca/en/department-justice/news/2023/04/strengthening-the-national-sex-offender-registry-and-empowering-victims-of-crime--government-of-canada-introduces-legislation.html

YourAnonRiots, to infosec Japanese
@YourAnonRiots@mstdn.social avatar

Better coordination between a company’s security and legal shops can go a long way towards ensuring that companies practice good business and good security, experts shared during an panel. https://www.scmagazine.com/analysis/compliance/cisos-legal-department-company-hacked

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • tacticalgear
  • cubers
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • osvaldo12
  • ngwrru68w68
  • GTA5RPClips
  • provamag3
  • InstantRegret
  • everett
  • Durango
  • cisconetworking
  • khanakhh
  • ethstaker
  • tester
  • anitta
  • Leos
  • normalnudes
  • modclub
  • megavids
  • lostlight
  • All magazines