ac_intel, to random

hacking campaign timeline conducted by ransomware gang.

Great repo to monitor the evolution of the threat thanks to @CuratedIntel , Equinix Threat Analysis Center (ETAC), @bushidotoken

🔗https://github.com/curated-intel/MOVEit-Transfer

ac_intel, to random Italian
LeeArchinal, to infosec

The known as strikes again, this time targeting think tanks, academia, and media organizations with a social engineering. The goal? Stealing Google and subscription credentials of a news and analysis service that focuses on North Korea. Enjoy and Happy Hunting!

Link in the comments!

This one is a little different. In this article, SentinelLabs mentioned ReconShark being used. Can you provide me with any TTPs that are associated with that ?

TA0001 - Initial Access
T1566.002 - Phishing: Spearphishing Link
T1566.001 - Phishing: Spearphishing File

TA0002 - Execution
T1204.001 - User Execution: Malicious Link
T1204.002 - User Execution: Malicious File

TA0006 - Credential Access
T1056.003 - Input Capture: Web Portal Capture

ReconShark TTPs:
Here is your chance to shine! Let me know what TTPs are associated with this malware!

Malicious Google Docs site (from source)

ChristinaLekati, to infosec

Germany's domestic intelligence apparatus (BfV), South Korea's National Intelligence Service (NIS) and the U.S. National Security Agency (NSA) warn about cyber attacks mounted by a threat actor tracked as Kimsuky, using #socialengineering and #malware to target think tanks, academia, and news media sectors.

"Kimsuky has been observed leveraging open source information ( #OSINT ) to identify potential targets of interest and subsequently craft their online personas to appear more legitimate by creating email addresses that resemble email addresses of real individuals they seek to impersonate.

The adoption of spoofed identities is a tactic embraced by other state-sponsored groups and is seen as a ploy to gain trust and build rapport with the victims. The adversary is also known to compromise the email accounts of the impersonated individuals to concoct convincing email messages.

#Kimsuky actors tailor their themes to their target's interests and will update their content to reflect current events discussed among the community of North Korea watchers.

Besides using multiple personas to communicate with a target, the electronic missives come with bearing with password-protected malicious documents, either attached directly or hosted on Google Drive or Microsoft OneDrive."

To read the full article (from @thehackernews):

https://thehackernews.com/2023/06/north-koreas-kimsuky-group-mimics-key.html?m=1

#cyber #opensourceintelligence #intelligence #nationalsecurity #cybersecurity #cybersecurityawareness #cybersecuritytraining #infosec #threatintelligence #threatintel #phishing #phishingattacks #cyberespionage #espionage

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

A bunch of people have alerted me to a vulnerability in #MoveIT, a secure file transfer app used heavily in the UK.

I did some digging and it looks like it’s a zero day under active exploitation. Not 100% on threat actor yet but it may be one of the ransomware/extortion groups.

Really serious, impacted orgs should shut down the server. Thread follows. #threatintel

adulau, to opensource

We are developing vulnerability-lookup which is a rewrite of cve-search to support and improve various requirements which came during the past years:

  • Improve the NVD NIST feeders to support the new API v2
  • Allow multiple source of vulnerability feeds to be ingested even if there is no associated CVE id
  • Support of GSD feeds (mainly where the Linux kernelvulnerabilities are described) and GitHub security vulnerabilities (more to come very soon)
  • Easily find the overlaps or differences between vulnerabilities allocated
  • A very fast API (we got rid of MongoDB and replaced it with kvrocks) to get the original vulnerability description from the different feeds

This is still pretty alpha but an initial release is coming in the next weeks.

If you want to contribute, test or have any ideas of additional feeds to add, let us know.

#opensource #threatintel #cvd #vulnerability #cve

🔗 https://github.com/cve-search/vulnerability-lookup

LeeArchinal, to infosec

Happy Tuesday everyone! is the topic of today's , specifically ThreatMon takes a deep-dive into the malware, which is a remote access trojan (RAT). Enjoy and Happy Hunting!

Link to article in the comments!

AS usual I am going to leave one of the MITRE ATT&CK blank. I would like to see if any of you that see this can help FILL in that blank! If so, leave your thoughts in the comments OR send me a DM!

Notable MITRE ATT&CK TTPs:
TA0007 - Discovery
T1087 - Account Discovery
T1083 - File and Directory Discovery
T1018 - Remote System Discovery
T1082 - System Information Discovery

TA0009 - Collection
T[What technique covers the threat actor capturing information under the TEMP folder?] - Good luck!

TA0011 - Command And Control
T1071.001 - Application Layer Protocol: Web Protocols

TA0002 - Execution
T1059.003 - Command and Scripting Interpreter: Windows Command Shell

HINT HINT (from source)

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

ransomchats - open source #ransomware negotiations

https://ransomch.at/

Example chat Royal Mail, watch their ransomware play out in real time: https://ransomch.at/lockbit3.0-royalmailgroup_com

Data in JSON format. https://github.com/Casualtek/Ransomchats

HT @ValeryMarchive #threatintel

mttaggart, to infosec

Goofy names notwithstanding, let's not overlook the gravity of this straight-up attack by China on US strategic infrastructure. https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/

#InfoSec #CyberSecurity #ThreatIntel

axi0kers0s, to random

In preparation of my dissertation project, my reading for the week.

#cybersecurity #cti #threatintel #dissertation #mastobook

rmceoin, to random

Wrote up an analysis of #SocGholish.

https://rmceoin.github.io/malware-analysis/socgholish/

I've only seen the client side of all this. Has anybody seen the infected server side that they can share details?

#ThreatIntel

SebastianWalla, to random

We at CrowdStrike are looking for a colleague that helps me study threats to the cloud! We are a remote first company, have a great data set, and I need some help to handle this influx of cloud cases. You would work as my direct counterpart in the Global Threat Analysis Cell which is focused on finding trends and clusters activities to adversaries with the intent of producing threat intelligence. The next SPIDER/…/PANDA/BEAR could carry a name that you chose:

https://crowdstrike.wd5.myworkdayjobs.com/en-US/crowdstrikecareers/job/Sr-Intelligence-Analyst---Cloud-Intelligence-Mission--Remote-_R13446

If you have any questions, feel free to reach out to me via direct message.

I know the job description states USA-Remote but I’m sure we are more flexible on the location as I am based in Europe.

megan, to infosec

Last night my co-authors and I turned in the final chapter's first draft for our book, Practical Detection Engineering: A hands-on guide to planning, developing, and validating threat detections. Still got a few rounds of technical reviews and copy edits but definitely a big milestone for us.

When performing competitor analysis we found that despite the numerous amazing blog posts from industry experts, there wasn't a complete book focused solely on detection engineering, so hopefully we can fill that gap for the field! The book is scheduled to release in early August and is available for pre-order on Amazon now:
https://www.amazon.com/Practical-Detection-Engineering-Confidently-detections/dp/1801076715

If you have a Packt subscription, it'll be in the eBook library too.

Thanks in advance for anyone who decides to invest in our work and check it out!

zeljkazorz, to random

Researchers have developed DarkBERT, a language model pretrained on dark web data, to help cybersecurity pros extract cyber threat intelligence (CTI) from the Internet’s virtual underbelly.

https://www.helpnetsecurity.com/2023/05/19/cti-dark-web/

#cti #darkweb #threatintel #cybersecurity

GossiTheDog, (edited ) to random
@GossiTheDog@cyberplace.social avatar

Lost my toot on it from last month, but I recommend you patch any #Zyxel Zywall devices for CVE-2023-28771 - it's super exploitable, pre-auth and facing to internet by design. #CVE202328771 #vulnerabilities

Exploit by @testanull

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

This #Zyxel vuln is being mass exploited now by Mirai botnet, target = whole internet. #CVE202328771

Payload https://www.virustotal.com/gui/file/f962134b1486261f1a28831c6605e0e404c39e6e29f88e4b24ce6ed3a559795c

A fuck ton of SMB VPN boxes are owned. #threatintel

grep_security, to infosec
Rairii, to random

from what i've seen about the new wave of DM spam:

another cryptocurrency based advance fee fraud, the threat actor appears to be chinese this time (terms are used on the site that are typically used on chinese sites, like "VIP" levels for paid membership)

this time you're given creds to an account with lots of assets; you can't "withdraw" without a password you don't have, you can "transfer out" but only to another paid account

i reported it to google safe browsing and to MS equivalent

#phishing #ThreatIntel

GossiTheDog, (edited ) to random
@GossiTheDog@cyberplace.social avatar

If you're looking for Black Basta samples, VirusTotal search: engines:blackbasta

Includes ransom notes, you can monitor victim chats from them. Other notes: filename:instructions_read_me.txt

#BlackBasta #ransomware #threatintel

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Black Basta have hit ABB. Their biggest victim so far, it’s bigger than Capita.

Not in article but Black Basta are using Qakbot via web links - eg SEO poisoning, fake browse updates.

#threatintel #qakbot #blackbasta

https://www.bleepingcomputer.com/news/security/multinational-tech-firm-abb-hit-by-black-basta-ransomware-attack/

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

I’ve independently confirmed #BlackBasta hit #ABB. They’re not on the portal, even unindexed, so may be paying. It’s a standard Black Basta playbook attack - all the usual TTPs. Exfil, too. #threatintel

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

#ABB have told clients they got hit with #ransomware (it's #BlackBasta) and data exfiltrated. #threatintel

HT @trevor

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Really good blog by @recon_infosec on a new* ransomware group, with some interesting new detection opportunities - for example, they use Cloudflare for remote access rather than CobaltStrike - zero EDR and AV coverage. #threatintel

Pretty much certain some of the things in this will become common.

https://blog.reconinfosec.com/emergence-of-akira-ransomware-group

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

Sophos MDR has a good write up about two Akira ransomware incidents https://news.sophos.com/en-us/2023/05/09/akira-ransomware-is-bringin-88-back/

Key other learnings for me:

  • Radmin also used for remote access
  • Dwell time was 7 days and over 30 days

#threatintel

percepticon, to random German
@percepticon@ioc.exchange avatar

WTF ist Cyber Threat Intelligence? Ist das nur Marketing oder steckt mehr dahinter? Darüber spreche ich in der neuen Podcast Folge mit den fabelhaften Kollegen, den Armchair Investigators #CyberThreatIntelligence #ThreatIntelligence #ThreatIntel https://percepticon.de/landing-page-2/

video/mp4

fod, to random

Does anyone know of good accounts or instances to follow that report the latest cyber security threats and vulnerabilities taking place around the world? Used to have some good hashtags to follow on Twitter, but now I’m trying to replicate the same feed on Mastodon.

mikey,
@mikey@friendsofdesoto.social avatar

@fod I recommend following the hashtags #threatintel #threatintelligence and #infosec
I also recommend some of these accounts ( that I hope wont get mad that I tag them here)
@GossiTheDog
@SwiftOnSecurity
@briankrebs
@Tarah
@hacks4pancakes
@malwaretech
@malwareunicorn
@myraccoonhands
@jackrhysider
@Em0nM4stodon
@digitalempress
@InfoSecSherpa

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • magazineikmin
  • ethstaker
  • InstantRegret
  • tacticalgear
  • rosin
  • love
  • Youngstown
  • slotface
  • ngwrru68w68
  • kavyap
  • cubers
  • DreamBathrooms
  • provamag3
  • mdbf
  • cisconetworking
  • GTA5RPClips
  • modclub
  • khanakhh
  • everett
  • Leos
  • osvaldo12
  • normalnudes
  • tester
  • Durango
  • anitta
  • JUstTest
  • All magazines