knitcode, to Cybersecurity

Folks -- keep in mind that most threat intel reporting containing domains is NOT designed for blocking. I have received enough questions about the recent OSINT reporting on Ivanti that it's worth a comment. Mandiant reports -- while great and in-depth -- include established companies and dynamic DNS services. Domains on the CyberReason list include things that aren't even domains but somehow have been elevated in VirusTotal and elsewhere to DNS status, e.g. request.data. It takes a lot of work to validate domains to protect networks while ensuring their performance. I don't recommend grabbing every ioc list and shoving it into your DNS or any firewall, regardless of the reputation of the source. These companies are offering IR data not blocking ioc lists. #dns #threatintel #malware #ivanti #infoblox #cybersecurity

InfobloxThreatIntel, to Cybersecurity

A few of the MFA lookalike domains we've detected recently. These target a large bank in the Czech Republic (csob[.]sk):
csob-sso-sk[.]net, online-csob-sso-sk-moja[.]com, csob-sso-sk[.]com

To learn more about MFA smishing check out this blog https://blogs.infoblox.com/cyber-threat-intelligence/how-bad-guys-are-undermining-trust-in-multi-factor-authentication-mfa/

#dns #infoblox #threatintel #cybersecurity #infosec #lookalike #phishing #mfa #smishing

InfobloxThreatIntel, to Cybersecurity

Almost a year ago we discovered DNS malware Decoy Dog and went on a wild ride chasing that down. In August, we did a deep dive webinar on the malware and how we analyzed it. No pay/sign wall! https://www.infoblox.com/resources/webinars/decoy-dog-is-no-ordinary-pupy-separating-a-sly-dns-malware-from-the-pack/

knitcode, to random

what's the word for when: the phishers who are stealing from the organized crime phishers that you are researching realize that you know they are fake (organized crime) and take down their entire infrastructure and social media presence in a few hours? i was going with "wow" but it doesn't seem quite the right word. i also tried "bummer". #dns #phishing #cybercrime #infoblox

InfobloxThreatIntel, to Cybersecurity

Nice paper by AT&T on asyncRAT. We see a lot of domains from registered domain generation algoritihms (RDGAs), but not a ton of traditional DGAs these days… but this IS one! asyncRAT DGA is keeping a lower profile by not generating too many domain variants. We've seen 37 SLDs in our resolvers this month from the asyncRAT DGA, almost all of which were NXDOMAIN responses. Only 2ira57j063uauto[.]top resolved for us recently. We were blocking it already as suspicious. Pro tip: topTLD plus 15 char new domain.. block. ;)

But even more interesting is that with the actor using dedicated hosting through BitLaunch, we can see that aside from their DGA domains they have the sneaky lookalike:

akamai-cdn[.]top registered on Decemeber 18th. Block that one!

Lots of interesting DNS on this actor.
https://cybersecurity.att.com/blogs/labs-research/asyncrat-loader-obfuscation-dgas-decoys-and-govno

InfobloxThreatIntel, to Cybersecurity

Hi. This is Renée, the head of Infoblox Threat Intel (@knitcode). Myself and a few of my researchers are sharing this Mastodon account. Our plan is to toot about suspicious and malicious activity in DNS. Our team tends to write very in-depth papers and want to use Mastodon to complement that with nuggets we've seen, updates on the DNS threat actors or TTPs we are seeing, and articles we are reading. Here goes!

knitcode, to infosec

Last year’s highlights…my team started to come out of our shell with a commitment to publishing high end original research on topics related to DNS threats
that were not covered by others…we’ve got big plans for 2024!

  • Decoy Dog was the first time an APT DNS malware was detected and reverse engineered from DNS query-response data…we got the actors to respond to us, and picked up some file samples later but this was a DNS story through and through

  • Open Tangle was the first publication of a dedicated lookalikes phishing DNS threat actor operating for over 4 years

  • We introduced the DNS threat actor technique of registered domain generation algorithms (RDGA) to evade detection

  • Prolific Puma was the first report of a malicious link shortener (and they use RDGA)

  • and we discovered that they had circumvented of the usTLD privacy regulations to boot…

We don’t publish the most, but we try to make every time count.
#dns #threatintel #infoblox #cybercrime #infosec #cybersecurity #malware #phishing

knitcode, to Cybersecurity

While we still don't know what devices are being compromised for the Decoy Dog malware, we know that they are ones that can persist a single process for over a year at a time... not your average laptop or phone. Things that come to mind are routers, switches, and firewalls. Unfortunately there are likely many more unknown vulnerabilities in other infrastructure products beyond the Cisco IOS XE one being discussed today. Some day, someone will figure out where Decoy Dog malware is hiding... and odds on: it is infrastructure. In particular, firewalls can organically create DNS traffic that is overlooked. In the meantime, time to patch up all the devices using Cisco IOS XE. #threatintel #cybersecurity #infoblox #dns #malware #infosec https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/ https://insights.infoblox.com/resources-whitepaper/infoblox-whitepaper-decoy-dog-is-no-ordinary-pupy-distinguishing-malware-via-dns

knitcode, to infosec

One of the daily stories of how DNS detects threats before they are known or used. I'm always keen to collaborate with the folks downstream in the malware world... if you know more about the malware or campaigns themselves let me know. (here or any time) We detect 30k+ registered DGAs a day and correlate them together. Never good news. #infosec #threatintel #dns #infoblox #malware #phishing https://blogs.infoblox.com/cyber-threat-intelligence/suspicious-dga-domains-discovered-in-dns-turn-up-in-malware-campaigns/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • tacticalgear
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • lostlight
  • All magazines