Opalsec :verified: · @Opalsec
169 followers · 79 posts · Server infosec.exchange

Last week's reporting gave a great insight into the level of innovation going on in the cyber crime ecosystem - C2 over MQTT, cryters delivering payloads over SQL connections, and UEFI bootkits that bypass Window's Secure Boot! We've pulled it all together, just for you:

opalsec.substack.com/p/soc-gou

The BlackLotus has been upgraded to exploit a vulnerability in Microsoft's Secure Boot Mechanism, allowing it to persist on fully patched Windows 11 systems. This is enabled in no small part by the failure to update the UEFI revocation list, which allowed the bootkit author to simply load and exploit the vulnerable UEFI components on target systems.

Australia's cyber security laws were "bloody useless" in helping mitigate the Optus and Medibank breaches of 2022, according to the government's Home Affairs Minister. A new "national cyber office", reforms to Critical Infrastructure security laws, and a new Cyber Security Act are all on the table for discussion.

zScaler analysts have picked up on the Snip3 crypter, a Crypter-as-a-Sevice offering which uses multiple obfuscated stages; an AMSI Bypass, and SQL queries to circumvent security controls.

Sysdig share insights from a sophisticated -centric campaign; ESET have uncovered a new backdoor used by China's Mustang Panda () which implements C2 over MQTT, and Team Cymru have again picked apart 's infrastructure to identify key TTPs.

Some interesting supply chain vulnerabilities this week, with bugs found in the ZK web app framework and Trusted Platform Module (TPM) having the potential to affect an untold number of applications and devices.

members will get a kick out of DroppedConnection - a PoC that mimics Cisco AnyConnect VPN to siphon credentials and serve up malware to unwitting victims.

The can look forward to some tips for GCP DFIR, bypassing malware geo-fencing, and tracking cyber criminal infrastructure.

Catch all this and much more in this week's newsletter:

opalsec.substack.com/p/soc-gou

#Bootkit #aws #apt27 #icedid #redteam #blueteam #infosec #cyber #news #cybernews #infosecnews #informationsecurity #cybersecurity #hacking #security #technology #hacker #vulnerability #vulnerabilities #malware #ransomware #dfir #soc #threatintel #threatintelligence #darkweb #criticalinfrastructure #breach #privacy #australia #crypter

Last updated 2 years ago

Daniel Lunghi · @thehellu
128 followers · 8 posts · Server infosec.exchange

My latest research on (/#EmissaryPanda/#LuckyMouse) is out ! It includes analysis of a new version of SysUpdate ported to Linux, a new communication protocol through DNS TXT requests, a VMProtect certificate compromise, and probable infection vector trendmicro.com/en_us/research/

#apt #irontiger #apt27

Last updated 3 years ago

Marcel SIneM(S)US · @simsus
168 followers · 2320 posts · Server social.tchncs.de
GRUzzly Bear :verified: · @1nternaut
239 followers · 107 posts · Server infosec.exchange

RT @sekoia_io@twitter.com

🕵️‍♂️ Following @Intrinsec@twitter.com’s report on 🇨🇳, we have just published a blogpost where we analyze TTPs and provide detection rules for most of them: blog.sekoia.io/lucky-mouse-inc

#apt27 #luckymouse #sigma #detectionengineering

Last updated 3 years ago

Parliamo di news! · @parliamodinews
16 followers · 87658 posts · Server masthead.social
skoops :verified: · @skoops
138 followers · 10531 posts · Server skoops.social

RT @aRtAGGI
Which Chinese APT actors are active in Europe right now against the federal sector, well according to Belgian gov, , , and . We know APT31 has for years targeted gov and parliamentary orgs in Europe. Would love more details on Gallium.
diplomatie.belgium.be/en/news/

#apt27 #APT31 #gallium

Last updated 3 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online