Just Another Blue Teamer · @LeeArchinal
128 followers · 193 posts · Server ioc.exchange

Good day everyone! The Microsoft Threat Intelligence team has discovered activity from a group known as . They are a nation-state group from China that targeted organizations in Taiwan. While the group leverages tools that are commonly used, like , , and , they also rely on abusing , or Living-off-the-land binaries and scripts (tools that exist and come with the native operating system). Some of their TTPs include using registry key modification for persistence, using , , or to download tools, and accessing process memory and Security Account Manager registry hive for credential access. This is a great article that not only provides high-level details but it provides a starting point for any organization to start threat hunting by using the technical details provided! Enjoy your weekend and !

#powershell #certutil #bitsadmin #Lsass #happyhunting #cybersecurity #itsecurity #infosec #blueteam #threatintel #threathunting #ThreatDetection #readoftheday #flaxtyphoon #ChinaChopper #metasploit #mimikatz #lolbins

Last updated 1 year ago

Nicola Fabiano · @nicfab
267 followers · 1689 posts · Server mastodon.nicfab.it

RT @AgidCert
Campagna 🇮🇹 a tema utilizza

📬 Oggetto: "Commissione di vigilanza sul registro tributario"

⚔️ TTP:

Email > Link > RAR > HTA > bitsadmin > DLL

💣 Disponibili gli 👇

🔗 cert-agid.gov.it/wp-content/up

Telegram: t.me/certagid/432

#ursnif #AgenziaEntrate #bitsadmin #ioc

Last updated 2 years ago