Just Another Blue Teamer · @LeeArchinal
130 followers · 197 posts · Server ioc.exchange

While most of us celebrate Labor Day let's all try to take a moment to remember those who don't get to spend time with their loved ones today, wherever they may be and whatever they may be doing!

I don't know how this report slid under my radar but the ESET researched team unveil a "Marioesque" themed adversary, ! They are a cyberespionage group that targets foreign embassies in Belarus with the use of their ISP level access and their tools and . Using their (assumed) unique level of access, they compromise their targets by redirecting them to a fake update site which loads JavaScript code then leads to a zip file being downloaded. The team wasn't able to get the zip file, but they were still able to identify some TTPs and abuse, such as creating a malicious scheduled task. I hope you enjoy and Happy Hunting!

#moustachedbouncer #Nightclub #disco #microsoft #lolbins #cybersecurity #itsecurity #infosec #blueteam #threatintel #threathunting #ThreatDetection #happyhunting #readoftheday #laborday

Last updated 1 year ago

Just Another Blue Teamer · @LeeArchinal
128 followers · 193 posts · Server ioc.exchange

Good day everyone! The Microsoft Threat Intelligence team has discovered activity from a group known as . They are a nation-state group from China that targeted organizations in Taiwan. While the group leverages tools that are commonly used, like , , and , they also rely on abusing , or Living-off-the-land binaries and scripts (tools that exist and come with the native operating system). Some of their TTPs include using registry key modification for persistence, using , , or to download tools, and accessing process memory and Security Account Manager registry hive for credential access. This is a great article that not only provides high-level details but it provides a starting point for any organization to start threat hunting by using the technical details provided! Enjoy your weekend and !

#powershell #certutil #bitsadmin #Lsass #happyhunting #cybersecurity #itsecurity #infosec #blueteam #threatintel #threathunting #ThreatDetection #readoftheday #flaxtyphoon #ChinaChopper #metasploit #mimikatz #lolbins

Last updated 1 year ago

Just Another Blue Teamer · @LeeArchinal
66 followers · 111 posts · Server ioc.exchange

Shout out to Malwarebytes Labs team for this ! I am a huge fan of anything Living-off-the-land binaries () and I this article provides a great description of what they are and how compare and contrast. Enjoy and Happy Hunting!

Fileless attacks: How attackers evade traditional AV and how to stop them
malwarebytes.com/blog/business

#readoftheday #lolbins #filelessattacks #cybersecurity #itsecurity #infosec #blueteam #threatintel #threathunting #ThreatDetection #happyhunting

Last updated 2 years ago

Just Another Blue Teamer · @LeeArchinal
58 followers · 89 posts · Server ioc.exchange

Happy Monday everyone! Today's focuses on a recently discovered ransomware strain that exhibits some behaviors that have allowed it to fly under the radar of researchers. The , or also known as by Check Point Software Technologies Ltd, exploits CVEs and some living-off-the-land () to accomplish their goals. Check out the article by Group-IB for the rest of the details! Happy Hunting!

The old way: BabLock, new ransomware quietly cruising around Europe, Middle East, and Asia
group-ib.com/blog/bablock-rans

#readoftheday #bablock #rorschach #lolbins #cybersecurity #itsecurity #infosec #blueteam #threatintel #threathunting #ThreatDetection #happyhunting

Last updated 2 years ago

Bishop Fox · @BishopFox
890 followers · 231 posts · Server infosec.exchange

If you caught today's episode featuring Carlos Yanez discussing Zimbra , be sure to check out his write-up on the topic, too! bfx.social/3lUL75U

Next month we're back with Lindsay Von Tish and Allan Cecil to talk about bypassing with .

#whatthevuln #security #edr #lolbins

Last updated 2 years ago

Ray Canzanese · @rcanzanese
10 followers · 9 posts · Server infosec.exchange

What does a targeted attack look like? This one begins with finding a weak link to infiltrate the network, pivoting using then using for data exfiltration. netskope.com/blog/blackcat-ran

#blackcat #lolbins #ExMatter #ransomware

Last updated 2 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online