Anonymous :anarchism: 🏴 · @YourAnonRiots
6067 followers · 37936 posts · Server mstdn.social
Just Another Blue Teamer · @LeeArchinal
123 followers · 186 posts · Server ioc.exchange

Good day to everyone, I hope that everyone is safe today! Researchers from Trend Micro provide intel on a group that they named . They witnessed a cyberespionage campaign that targeted governments and technology industries around the world! Once they gained access they installed on the victims system, used backdoors for repeated access, and then collected PDFs and DDF files. They provide in-depth technical details on the other tools that were used on top of all the useful information in this article. Enjoy and Happy Hunting!

Earth Estries Targets Government, Tech for Cyberespionage
trendmicro.com/en_us/research/

#earthestries #cobaltstrike #cybersecurity #itsecurity #infosec #blueteam #threatintel #threathunting #ThreatDetection #happyhunting #readoftheday

Last updated 1 year ago

Mr.Trunk · @mrtrunk
10 followers · 16586 posts · Server dromedary.seedoubleyou.me

SecurityOnline: CVE-2023-36874_BOF: Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE securityonline.info/cve-2023-3 -2023-36874

#postexploitation #cve #cobaltstrike

Last updated 1 year ago

Anonymous :anarchism: 🏴 · @YourAnonRiots
6024 followers · 37459 posts · Server mstdn.social

Espionage Disguised as ?

Ongoing cyber attacks traced back to China target Southeast Asian gambling. Learn how Bronze Starlight deploys beacons and hides motives behind ransomware smokescreens.

thehackernews.com/2023/08/chin

#Hacking #CyberSecurity #cobaltstrike #Ransomware

Last updated 1 year ago

Mr.Trunk · @mrtrunk
6 followers · 13229 posts · Server dromedary.seedoubleyou.me
Just Another Blue Teamer · @LeeArchinal
88 followers · 143 posts · Server ioc.exchange

everyone and it's always a good start when the new The DFIR Report drops! This one includes , , and ends in data exfiltration and the deployment of the . Enjoy and Happy Hunting!

Link in the comments!

***I am going to leave one of the MITRE ATT&CK blank. I would like to see if any of you that see this can help FILL in that blank! If so, leave your thoughts in the comments OR send me a DM!***

TA0001 - Initial Access
T1566.002 - Phishing: Spearphishing Link

TA0002 - Execution
T1053.005 - Scheduled Task/Job: Scheduled Task
T1204.002 - User Execution: Malicious File

TA0003 - Persistence
T1053.005 - Scheduled Task/Job: Scheduled Task
T1078.003 - Valid Accounts: Local Accounts

TA0008 - Lateral Movement
[Here is your chance to fill in the blanks! Enjoy!]

#happymonday #truebot #cobaltstrike #mbrkiller #cybersecurity #itsecurity #infosec #blueteam #threatintel #threathunting #ThreatDetection #happyhunting

Last updated 1 year ago

Anonymous :anarchism: 🏴 · @YourAnonRiots
5570 followers · 34658 posts · Server mstdn.social

Researchers warn of rising (a Golang variant) payloads on VirusTotal. Red teaming or malicious attacks?

Either way, it's time to tighten your defenses.

thehackernews.com/2023/05/hack

#InfoSec #CyberSecurity #informationsecurity #macOS #cobaltstrike #geacon

Last updated 1 year ago

Geekmaster 👽:system76: · @Geekmaster
166 followers · 1246 posts · Server ioc.exchange
Anonymous :anarchism: 🏴 · @YourAnonRiots
5561 followers · 34524 posts · Server mstdn.social

Threat Alert! A Golang variant of , known as Geacon, is drawing attention in the world due to a rise in Geacon payloads on VirusTotal.

thehackernews.com/2023/05/hack

#InfoSec #CyberSecurity #cobaltstrike

Last updated 1 year ago

Redhotcyber · @redhotcyber
462 followers · 900 posts · Server mastodon.bida.im

Digital Crimes Microsoft: stop all’abuso dei tools di sicurezza informatica per distribuire malware

Stop all’abuso e alle copie e di e del utilizzate dai per distribuire .

Questo è l’obiettivo della Digital Crimes Unit () di , che sta intraprendendo una nuova strategia – in sinergia con la società di per la sicurezza Fortra™ e l’Health Information Sharing and Analysis Center ( Health- ) – per impedire ai di abusare degli strumenti di sicurezza.

redhotcyber.com/post/digital-c

#crackate #legacy #cobaltstrike #software #microsoft #criminali #malware #dcu #informatica #isac #informatici #redhotcyber #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #CyberSecurityAwareness #cybersecuritytraining #CyberSecurityNews #privacy #infosecurity

Last updated 2 years ago

Hackread.com · @Hackread
164 followers · 110 posts · Server mstdn.social

Microsoft and cybersecurity firm Forta have joined forces to take down the malicious infrastructure of , which is used in large-scale ransomware attacks.

Read: hackread.com/microsoft-fortra-

#Microsoft #Ransomware #CyberSecurity #cybercrime #Security #cobaltstrike

Last updated 2 years ago

Uncover the Secrets of Targeted User Surveillance with WindowSpy, the ultimate tool for red teamers and ethical hackers! Read my latest article to learn more. cyber-consult.org/targeted-use

#windowspy #cobaltstrike #cybersecurity

Last updated 2 years ago

ottoto · @ottoto2017
20 followers · 135 posts · Server prattohome.com

「マイクロソフトは、サイバー犯罪者による Cobalt Strike ツールの違法使用を阻止するために法的措置を講じます」: The Hackernews

「Microsoft は、Fortra および Health Information Sharing and Analysis Center (Health-ISAC) と協力して、ランサムウェアを含むマルウェアを配布するサイバー犯罪者による Cobalt Strike の悪用に取り組む」

いよいよ本腰。

thehackernews.com/2023/04/micr

#prattohome #thehackernews #cobaltstrike #microsoft

Last updated 2 years ago

Opalsec :verified: · @Opalsec
175 followers · 85 posts · Server infosec.exchange

Happy Monday folks, I hope you had a restful weekend and managed to take a breather from all things cyber! Time to get back into it though, so let me give you hand - catch up on the week’s infosec news with the latest issue of our newsletter:

opalsec.substack.com/p/soc-gou

are back and are using…OneNote lures? ISO disk images? Malvertising? Nah – they’re sticking with tier tried and true TTPs – their Red Dawn maldoc template from last year; macro-enabled documents as lures, and null-byte padding to evade automated scanners.

We’ve highlighted a report on the Xenomorph Banking Trojan, which added support for targeting accounts of over 400 banks; automated bypassing of MFA-protected app logins, and a Session Token stealer module. With capabilities like these becoming the norm, is it time to take a closer look at the threat Mobile Malware could pose to enterprise networks?

North Korean hackers have demonstrated yet again that they’re tracking and integrating the latest techniques, and investing in malware development. A recent campaign saw eight new pieces of malware distributed throughout the kill chain, leveraging to deliver payloads and an in-memory dropper to abuse the technique and evade EDR solutions.

A joint investigation by and has unearthed a two-year campaign by Chinese actors, enabled through exploitation of unpatched SMA100 appliances and delivery of tailored payloads. A critical vulnerability reported by this week helps reinforce the point that perimeter devices need to be patched with urgency, as it’s a well-documented target for Chinese-affiliated actors.

is a novel malware targeting routers, sniffing network traffic and proxying C2 traffic to forward-deployed implants. TTPs employed in recent and campaigns are also worth taking note of, as is , a new malware family targeting specific web server applications to brute force logins and deploy an IRC bot for C2.

Those in Vulnerability Management should take particular note of the vulnerability, which appears trivial to exploit and actually delivers plaintext credentials to the attacker. CISA have also taken note of nearly 40k exploit attempts of a 2 year old code-exec-as-root vulnerability in the Cloud Foundation product in the last two months, so make sure you’re patched against it.

members have some excellent reading to look forward to, looking at HTTP request smuggling to harvest AD credentials and persisting with a MitM Exchange server, as well as a detailed post that examines ’s reflective loading capability;

The has some great tradecraft tips from @inversecos on DFIR, as well as tools to help scan websites for malicious objects, and to combat the new and well-established Raccoon Stealer.

Catch all this and much more in this week's newsletter:

opalsec.substack.com/p/soc-gou

#emotet #android #microsoft #intune #byovd #mandiant #sonicwall #fortinet #hiatusrat #draytek #batloader #qakbot #gobruteforcer #veeam #vmware #redteam #cobaltstrike #blueteam #azure #stealc #infostealer #infosec #cyber #news #cybernews #infosecnews #informationsecurity #cybersecurity #newsletter #hacking #security #technology #hacker #vulnerability #vulnerabilities #malware #ransomware #dfir #soc #threatintel #threatintelligence #darkweb #mdm #dprk #fortios #FortiProxy

Last updated 2 years ago

This week's newsletter issue is out! Have a look at it. It includes, but not only:

  • CISA warns of actively exploited bug after breach
  • Brazil seizing shipments to prevent use in crime
  • X-Force on defining the Reflective Loader
  • Security researchers targeted with new via job offers on
  • Alleged NetWire RAT Operator Arrested in Croatia as FBI Seizes Website
  • Xenomorph malware now steals data from 400 banks
  • makes 2FA mandatory next week for active developers
  • The E11 door phone/intercom is riddled with security holes
  • Custom Chinese Malware Found on Appliance
  • Building Great OT Incident Response Tabletop Exercises, by @hacks4pancakes
  • Warning: Don't Let Manage Your
  • warns of new critical unauthenticated RCE
  • fixes bug that lets hackers breach infrastructure
  • AI-Powered '' Keylogging Attack Evades Modern Security
  • Hard-coded secrets up 67% as secrets sprawl threatens software supply chain
  • malware attacks return after three-month break

.. And many more. Subscribe to receive it directly in your inbox every Sunday!

0x58.substack.com/p/my-shared-

#infosec #plex #lastpass #FlipperZero #ibm #cobaltstrike #malware #linkedin #android #github #akuvox #sonicwall #google #passwords #fortinet #vulnerability #veeam #backup #blackmamba #edr #emotet #cybersecurity #security #newsletter

Last updated 2 years ago

Nice write-up on some cobalt strike functionality (reflective loader). I'm going to play with this a bit as I try to focus on red team tactics. I'm dusting off my knowledge in this area (and trying to improve it!) as I've got a couple cyber skills competitions upcoming that I'm scheduled on the red side!

I know cobalt strike is a little dated at this point. Any recommendations for the latest shiny new c2 tooling in the wild?

securityintelligence.com/posts

#cobaltstrike #cybersecuritystudent #cysec #redteam

Last updated 2 years ago

4.8 is out -

“System Calls Support

This release sees the addition of support for direct and indirect . We have added support for a number of system calls, specifically:

CloseHandle
CreateFileMapping
CreateRemoteThread
CreateThread
GetThreadContext
MapViewOfFile
OpenProcess
OpenThread
ResumeThread
SetThreadContext
UnmapViewOfFile
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualProtect
VirtualProtectEx
VirtualQuery”

cobaltstrike.com/blog/cobalt-s

#cobaltstrike #systemcalls #blueteam #threatintel #threatintelligence #infosec #cyber #redteam #cybersecurity #informationsecurity

Last updated 2 years ago

Anonymous :verified_alt: 🏴 · @YourAnonRiots
5297 followers · 31214 posts · Server mstdn.social

Hackers had stolen the sensitive data of 2.1 million customers from this testing service.

hackread.com/dna-testing-servi

#Malware #cobaltstrike #breach #Hacking #Security #dna

Last updated 2 years ago

Opalsec :verified: · @Opalsec
163 followers · 76 posts · Server infosec.exchange

Find your Monday motivation with a recap of last week's infosec news - with vulnerabilities to patch and new research to read up on, there's plenty to help warm up the old noggin' before diving into another week:

opalsec.substack.com/p/soc-gou

have helpfully suggested patching a bunch of security exceptions it previously recommended making for earlier versions of , as they're no longer necessary and - oh yeah - because actors have also been actively abusing it to drop backdoors for years!

Stealc is a new, and in-demand Malware-as-a-Service offering on the Dark Web. The infostealer has received three major updates in the month since its release, and comes with all the major features a cyber crim could wish for to pilfer data and deliver additional stages.

A personal favourite from last week - realised a little too late that the Royal Mail negotiator had - in their words - "bamboozled" them throughout their extortion attempts. A real masterclass in how to handle a ransomware negotiation

VulnCheck have reported finding 7.5k instances on the internet that were vulnerable to a 2021 directory traversal vulnerability. This was lost in the hysteria around Log4Shell which emerged just days later, but can still be abused to write content to disk, or simply wipe the entire database altogether.

The vulnerability from the week before has come under widespread attack after a working exploit was released by researchers just two business days after the vulnerability was disclosed. Assume breach, patch, and hunt if you're not on top of this already.

For the , there's a cool BOF implementation of a Threadless process injection technique presented at Bsides Cyrus this year.

It's been a good week for the , with research and tools to help in detecting Cobalt Strike's Fork&Run procedure, a number of malware families and FOSS C2 frameworks, and more.

Good luck, and happy hunting!

opalsec.substack.com/p/soc-gou

#microsoft #exchange #lockbit #grafana #fortinac #redteam #blueteam #infosec #cyber #news #cybernews #infosecnews #informationsecurity #cybersecurity #hacking #security #technology #hacker #vulnerability #vulnerabilities #malware #ransomware #dfir #soc #threatintel #threatintelligence #fortinet #cobaltstrike #darkweb

Last updated 2 years ago

Anonymous :verified_neko:🏴 · @YourAnonRiots
5289 followers · 30966 posts · Server mstdn.social

📢 Hackers had stolen the sensitive data of 2.1 million customers from this testing service.

hackread.com/dna-testing-servi

#Malware #cobaltstrike #breach #Hacking #Security #dna

Last updated 2 years ago