Tidal Cyber · @tidalcyber
19 followers · 26 posts · Server infosec.exchange

At Tidal Cyber, we take the "community" part of Tidal Community Edition seriously. We want the whole community to benefit from work done in the platform. Have you created a great technique set or matrix in Community Edition? Share it!

From now until March 31, we'll be sending Tidal swag to users who share their work on social media. Just tag Tidal Cyber and use in your post, and we'll reach out to get your shipping address to send your swag.

#sharedwithtidal #threatintel #cybersecurity #threatintelligence

Last updated 2 years ago

Tidal Cyber · @tidalcyber
19 followers · 25 posts · Server infosec.exchange

Don’t approach your threat profile irrationally – use our Matrix to slice through the infinite universe of threats and bring more (mathematically) constant focus on the ones that matter most: hubs.la/Q01GPxgV0

Whether you’re a freshly-baked analyst/operator or a crusty infosec veteran, the piping hot and fresh content in Tidal’s free Community Edition is sure to ins-pie-re the next step in your threat-informed defense journey!

Our latest matrix features seven timely threats:

PyPI Malicious Packages: A recent report from Sonatype highlighted software supply chain compromises, where four Python packages hosted on the PyPI software registry contained malicious code that could drop malware, delete system utilities, & tamper with files containing authorization keys

AppleSeed: According to the MITRE ATT&CK knowledge base, “AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.”

Raspberry Robin: A highly active worm that spreads through removable media and abuses built-in Windows utilities after initial infection. Raspberry Robin has evolved into a major malware delivery threat, with links to infections involving Cobalt Strike, SocGholish, Truebot, and ultimately ransomware

Chocolatey Backdoor: Last March, Proofpoint identified an attack on French organizations in multiple sectors that used Chocolatey, an open-source package installer, to fetch malicious scripts that delivered the Serpent backdoor (this represents one of the first documented uses of Chocolatey in a cyber campaign)

(Key) LimeRAT: Trellix researchers documented a July 2022 spearphishing campaign targeting government agencies across South Asia, Europe, and North America that ultimately delivered AsyncRAT & LimeRAT. As a special bonus, this set of Pi Day techniques fittingly features T1056.001 (Input Capture: Keylogging)!

Banana Sulfate: This small set derives from Sekoia.io’s investigation into a large and sophisticated but unattributed infrastructure cluster last February
Golden Chickens: Security researchers assess this is a malware-as-a-service provider whose customers include FIN6, Cobalt Group, and the Evilnum APT group.

#piday #ttps #sharedwithtidal #threatinformeddefense #threatintel #threatintelligence

Last updated 2 years ago

TropChaud · @IntelScott
213 followers · 39 posts · Server infosec.exchange

is a highly active banking Trojan-turned-loader that has recently appeared on multiple vendors’ priority threat lists, attacking organizations in a wide range of verticals & countries. If your leadership or other stakeholders asked for a list of this threat's most common TTPs, would you be able to provide it quickly?

Now you can, with the Gootloader matrix available in Tidal’s free Community Edition: app.tidalcyber.com/share/796ca

Gootloader, also referred to by its related payload, , first emerged in 2014 but has been especially active since 2020. Despite this, technical reporting around its TTPs has been relatively light until even more recently. In the past two years alone, verticals including finance, , defense, pharmaceutical, energy, & automotive have faced Gootloader campaigns, with victims across North America, Western Europe, & South Korea, and the malware is regularly used to deliver high-impact payloads, including Cobalt Strike, (a common precursor), & more. Industry-based profiling can be a powerful tool, but even if your industry (or your corner of it) hasn’t yet directly observed Gootloader activity, we believe broad-based threats like this should be on most teams’ radars

Our matrix summarizes Gootloader TTPs detailed across several great recent technical reports. Reports from SentinelLabs, Cybereason, & The DFIR Report were helpfully pre-mapped to , and we mapped a couple other detailed analyses. Procedural details are even available for nearly all the included technique mappings – be sure to click the Technique Set’s label in the ribbon at the top of the screen to pivot into the Details page with this information & relevant source links throughout

Red Canary & The DFIR Report helpfully provided tool-agnostic suggested logic for key behaviors observed during recent Gootloader campaigns here redcanary.com/blog/gootloader/ and here thedfirreport.com/2022/05/09/s. Take a wider view by layering entire segments of your defensive stack over the back in the Community Edition, by toggling on any of the mappings available in @tidalcyber's Product Registry app.tidalcyber.com/vendors

#detection #cti #sharedwithtidal #threatinformeddefense #cobaltstrike #initialaccess #blueteam #Gootloader #malware #ttp #Gootkit #healthcare #icedid #ransomware #threat #mitreattack

Last updated 2 years ago

TropChaud · @IntelScott
192 followers · 36 posts · Server infosec.exchange

Prioritizing TTPs for ransomware linked to Royal Mail attack

After media reports linking ransomware to the attack on the UK’s largest mail delivery service, which halted some delivery operations (bleepingcomputer.com/news/secu), we revisited our technique set for this and added 20 technique references (including six net-new techniques linked to this malware in our knowledge base). View the data here: app.tidalcyber.com/share/bcc36

LockBit 3.0 emerged in July as the latest variant in this highly active family of ransomware-as-a-service (RaaS). LockBit was likely the single most active cluster of 2022, accounting for the most publicly extorted victims last year by far (a very rough approximation for overall activity – more on the nuances of public victim data below)

Considering threats to your industry & immediate peers is a great entry point to building a cyber “threat profile”. Many of the top , including LockBit, stand out for the breadth of sectors they’ve victimized – often, if you look hard enough, you can likely find at least one victim in a given vertical associated with a particular RaaS family. It’s therefore usually pertinent to evaluate many of these threats in your profiling efforts and consider taking some steps to reinforce defenses around them

Likely in part due to extra scrutiny, LockBit 3.0 has more linked techniques (57) than any other threat in our Ransomware & Data Extortion Landscape mega-matrix (app.tidalcyber.com/share/9a0fd). Orders of magnitude less than the # of associated indicators (see here for just one indication of volume valhalla.nextron-systems.com/i) but still a fair amount worth prioritizing. A good entry point for this involves gauging the widest gaps between highest-density techniques (those seen most often in your data) and those you’ve determined you are most- or least-defended against. The attached table shows Sigma, Atomic Red Team, & Data Component coverage for select LockBit 3.0 techniques – these and many commercial capabilities can all be easily surfaced, pivoted to, or overlaid in Tidal’s free Community Edition

And while technique counts are usually much smaller than IOC volume, remember adversaries can & and do (increasingly) evolve their TTPs, underscoring the importance of intelligence tracking over time where team resources & bandwidth allow: tidalcyber.com/blog/identifyin

Finally, several recent thoughtful articles/discussions commenting on important nuances to consider when looking to victim extortion/data leak sites to gauge ransomware prevalence: ohadzaidenberg.com/post/victim
curatedintel.org/2022/11/the-d
twitter.com/uuallan/status/159

#lockbit #threat #ransomware #raas #sharedwithtidal #threatinformeddefense #royalmail

Last updated 2 years ago

TropChaud · @IntelScott
184 followers · 33 posts · Server infosec.exchange

Proud to share our second analysis piece, which just went live! BLUF: All the pieces are in place for a serious, near-term uptick in infostealer threats involving higher-value targets, including businesses of all sizes, paralleling the shift among top ransomware groups toward “big-game” targets in years past. Part 1 details our evidence that intent, opportunity, & capability (the components of a “threat”) are all rising, and Part 2 will share our process for using this threat intelligence to drive development of new detections around the TTPs most commonly shared across today’s top stealers.

Despite a little more attention over the past year or so, I’ve sensed for some time that infostealers remain an “underrated” concern relative to the level of threat they pose to organizations, and there has yet to be a broad threat assessment or analysis of common techniques at quite this scale. Entirely based on (a large body of) public reporting, I think we’re able to draw unique insights in this series, and @tidalcyber's Community Edition made it a lot easier to get there.

Despite (what we see as) a rising threat, it’s not all doom and gloom – there are some extremely practical steps defenders can take to really lower the risk profile. Throw a few straightforward detections that we’ve compiled (they’ll come with Part 2, still cleaning up some rules sorry) in place, which cover many flavors of technique implementations associated with a wide range of these threats. Once you’ve set (and ideally validated) this coverage, consider tackling the likely more complex task of reviewing and tuning relevant people- and technology-related mitigations, including around identity & access (where today’s stealers pose some tricky challenges) and policies for responsible device use (to counter trending initial access vectors covered here in Part 1).

tidalcyber.com/blog/big-game-s

#infostealer #redline #raccoon #stealernostealing #threatinformeddefense #sharedwithtidal #malware #risk

Last updated 2 years ago

Tidal Cyber · @tidalcyber
14 followers · 12 posts · Server infosec.exchange

@grep_security Thanks for sharing!

#sharedwithtidal

Last updated 2 years ago

TropChaud · @IntelScott
166 followers · 25 posts · Server infosec.exchange

Today we’re sharing initial versions of two dashboards that summarize the top attack techniques associated with two major trends from the past year. Both are rich with recent supporting evidence and fill important gaps around timely, aggregated, actionable information related to key threats that we expect will persist (and likely grow) in 2023.

Consider bookmarking both dashboards – we also expect we’ll need to update the groups & malware (and associated techniques) as activity continues into next year.

First is a roundup of associated with major malware. This covers a total of 265 technique references (across 83 unique techniques) associated with 10 credential/info stealers that have been highly active over the past year-plus or emerged in recent months. Some likely familiar names, like Raccoon (and its v2 iteration), RedLine, & Mars, but also many others. The volume of stolen by malware like these has skyrocketed in recent years, and this vector has contributed to some of the past year’s most high-profile breaches. Many initial infections occur through individual personal downloads, but this is a multi-faceted threat that absolutely creates risk for organizations too. Check out the dashboard in Tidal’s free Community Edition here: app.tidalcyber.com/share/ec62f

Next is the Data Extortion Ecosystem TTP map. Driven by a few factors, most notably speed, we’ve observed a clear shift among some groups in the /extortion space toward attacks that feature no actual -based encryption, but rather just data exfiltration (and in some cases outright data destruction or manipulation). This combined heatmap covers eight groups & software leading this trend, including some covered recently in U.S. federal government CTI reporting, like LAPSUS$ & Karakurt, but also a few lesser known threats (RansomHouse and…Donut Leaks?). Currently this covers 135 technique references (across 68 unique techniques), but I definitely expect this set to evolve into early next year & beyond: app.tidalcyber.com/share/1a265

Consider these early previews of some of our top content themes for the first half of 2023 – lots more written analysis to come on these, and if you want the full picture, sign up for our 2023 threat landscape briefing, scheduled for noon ET on January 10! hubs.la/Q01v-PN00

#ttp #infostealer #credentials #ransom #ransomware #cti #threatinformeddefense #sharedwithtidal

Last updated 2 years ago

TropChaud · @IntelScott
180 followers · 28 posts · Server infosec.exchange

Today we’re sharing initial versions of two dashboards that summarize the top attack techniques associated with two major trends from the past year. Both are rich with recent supporting evidence and fill important gaps around timely, aggregated, actionable information related to key threats that we expect will persist (and likely grow) in 2023.

Consider bookmarking both dashboards – we also expect we’ll need to update the groups & malware (and associated techniques) as activity continues into next year.

First is a roundup of associated with major malware. This covers a total of 265 technique references (across 83 unique techniques) associated with 10 credential/info stealers that have been highly active over the past year-plus or emerged in recent months. Some likely familiar names, like Raccoon (and its v2 iteration), RedLine, & Mars, but also many others. The volume of stolen by malware like these has skyrocketed in recent years, and this vector has contributed to some of the past year’s most high-profile breaches. Many initial infections occur through individual personal downloads, but this is a multi-faceted threat that absolutely creates risk for organizations too. Check out the dashboard in Tidal’s free Community Edition here: app.tidalcyber.com/share/ec62f

Next is the Data Extortion Ecosystem TTP map. Driven by a few factors, most notably speed, we’ve observed a clear shift among some groups in the /extortion space toward attacks that feature no actual -based encryption, but rather just data exfiltration (and in some cases outright data destruction or manipulation). This combined heatmap covers eight groups & software leading this trend, including some covered recently in U.S. federal government CTI reporting, like LAPSUS$ & Karakurt, but also a few lesser known threats (RansomHouse and…Donut Leaks?). Currently this covers 135 technique references (across 68 unique techniques), but I definitely expect this set to evolve into early next year & beyond: app.tidalcyber.com/share/1a265

Consider these early previews of some of our top content themes for the first half of 2023 – lots more written analysis to come on these, and if you want the full picture, sign up for our 2023 threat landscape briefing, scheduled for noon ET on January 10! hubs.la/Q01v-PN00

#ttp #infostealer #credentials #ransom #ransomware #cti #threatinformeddefense #sharedwithtidal

Last updated 2 years ago

TropChaud · @IntelScott
162 followers · 24 posts · Server infosec.exchange

⚠️ Cuba Ransomware resources drop ⚠️

A new ransomware advisory comes in hot to one of your intelligence channels – what are your next steps? In our latest video, we walk through our approach to a situation like this, which analysts face almost every day amid growing volumes of CTI shared in the community today youtube.com/watch?v=K1a6Mac1-y

Link to the latest @CISA @FBI alert on Cuba Ransomware, published Dec 1 (and updated just yesterday) cisa.gov/uscert/ncas/alerts/aa

Past advisories on five other highly active in targeting U.S. critical infrastructure – and many other – organizations just this year: cisa.gov/stopransomware/stopra

According to the alert, “Since spring 2022, Cuba ransomware actors have modified their TTPs and tools to interact with compromised networks and extort payments from victims.” We’re likely to see more of this “TTP evolution” theme in 2023. As adversaries continue to evolve their TTPs rapidly and often, we had the chance to write more about this trend on our blog recently: tidalcyber.com/blog/adversary-

(And here’s another piece covering TTP evolution relative to another top malware, QakBot tidalcyber.com/blog/identifyin)

In the walkthrough, we highlight metrics around threats made on ransomware “extortion blogs” as just one public data point around Cuba’s growing threat in recent months. The figures come from this incredible public dataset github.com/joshhighet/ransomwa

The rest of the walkthrough centers on our free Community Edition tool. Jump into it here: app.tidalcyber.com/. No registration is required to access a ton of features (including everything shared below) but you know the drill: you’ll ultimately find the most value with a quick email sign-up 📋

Ransomware details from app.tidalcyber.com/software/09

Technique set for Cuba TTPs published in February app.tidalcyber.com/share/6fbf9 (source: mandiant.com/resources/blog/un)

Cuba technique set based on CISA’s/FBI’s new alert: app.tidalcyber.com/share/11c63

Script to quickly convert techniques & procedures from recent into a technique “layer” json file: github.com/mitre-attack/attack

LSASS Memory technique details page, with pivots to aligned defensive capabilities, detection analytics, & tests: app.tidalcyber.com/technique/a

Cuba Ransomware report referencing LSASS Memory & Disable or Modify Tools techniques: unit42.paloaltonetworks.com/cu

Disable or Modify Tools technique details page: app.tidalcyber.com/technique/9

Final Cuba Ransomware technique time series comparison/overlay: app.tidalcyber.com/share/7631b

Dashboard we’re maintaining covering all TTPs from the alert series, currently spotlighting six high-priority ransomware and updated each time CISA publishes a new alert: app.tidalcyber.com/share/9c1f0

Join the Tidal Community Slack channel to engage with & learn from others throughout the space join.slack.com/t/tidalcommunit

Catch this and other walkthroughs on the @tidal Cyber YouTube channel youtube.com/@tidalcyber6071

#stopransomware #ransomware #cuba #mitreattack #cti #threatinformeddefense #cyberthreatintelligence #cybersecurity #osint #sharedwithtidal

Last updated 2 years ago

TropChaud · @IntelScott
152 followers · 23 posts · Server infosec.exchange

Brush up on TTPs in light of the news the China-linked group ran a campaign to steal millions’ worth of U.S. state government COVID-19 relief funds nbcnews.com/tech/security/chin

APT41 is relatively unique among suspected Chinese for carrying out repeated cyber attacks for both and likely personal financial gain. The recent news isn’t the first to highlight the group’s dual motivations – it has been observed conducting financial operations since at least the mid-2010’s: content.fireeye.com/apt-41/rpt

A few reports from this year give insight into APT41’s recent attack techniques:
Original report on APT41 attacks involving U.S. state government entities from March: mandiant.com/resources/blog/ap
Review of four APT41 campaigns observed last year, published in August: blog.group-ib.com/apt41-world-
Threat activity details associated with a “new subgroup” of APT41, which seems especially focused on victims in south/southeastern Asia (published last month): trendmicro.com/en_us/research/

ATT&CK’s knowledge base gives a good baseline of APT41 behavior, covering 59 techniques sourced from eight reports published through June 2021 (yellow in my dashboard screenshot). I layered on the 62 techniques referenced in the latter two reports above (blue & purple in my matrix, respectively) for a broader picture that also lets us compare & contrast techniques observed in different series of activity. Links to everything follow:

APT41 profile & techniques: app.tidalcyber.com/groups/5022
Technique set for August report: app.tidalcyber.com/share/ae8d3
“Earth Longzhi” techniques: app.tidalcyber.com/share/b60fe
Combined heatmap: app.tidalcyber.com/share/463e9
Search or filter attack Groups by Motivation, Suspected Attribution, and Observed Sectors & Countries: app.tidalcyber.com/groups

#apt41 #apt #espionage #cti #fraud #ttp #threatinformeddefense #sharedwithtidal

Last updated 2 years ago

TropChaud · @IntelScott
152 followers · 23 posts · Server infosec.exchange

Excited to share @tidalcyber's first original intel analysis piece! I've noticed a steady stream of news in my feeds the past few weeks, making it challenging to keep track of what is new, what's already known, and what can be done about this persistent threat.

Breaking up QakBot's TTP evolution into a few smaller chunks helped make better sense of the trends by highlighting distinct techniques observed more over certain recent time periods. We can then turn to a number of great public resources that community members have recently shared, to take measurable steps toward improving defenses in line with these behaviors.


tidalcyber.com/blog/identifyin

#ttp #qakbot #cti #threatinformeddefense #sharedwithtidal

Last updated 2 years ago

TropChaud · @IntelScott
82 followers · 13 posts · Server infosec.exchange

Analyzing overlap for nine top

This originates from analysis of ransomware targeting schools, but most of these families have threatened a range of critical infrastructure & other industries too

Each ransomware covered here has published extortion threats involving a school or university during the past year, and this trend is increasing. I tallied 66 ransomware extortion threats against these entities since last October. A few groups dominate (see pie chart), and victim count jumped especially high in recent months for schools (K-12) (see bar chart).

The covered here (and count of associated extortion threats against education entities) are: (25), (8), 3.0 (7), / (6), LockBit 2.0 (5), (4), (3), , Snatch (2), & , , Sabbath, and Stormous (1 each). Also / , which is used by Vice Society, but no relevant posts were observed.

Visual summary of my analysis: app.tidalcyber.com/share/8d9f2

Overall the nine ransomware map to 131 unique techniques total, sourced from 30 recent public reports, mainly malware analysis & government advisories ("Show only labelled techniques" gives the best view). The underlines & numbers in the cells indicate number of malware mapped to that technique. Background color gradient represents number of sources referencing it. This tool helps with pivoting to defenses and analytics (think Sigma rules), offensive tests (Atomic Red Team), and data sources (make sure you have proper logging enabled) mapped to the same techniques.

#ttp #ransomware #education #malware #vicesociety #pysa #lockbit #ALPHV #blackcat #hive #bianlian #quantum #Conti #revil #hellokitty #FiveHands #threatintel #sharedwithtidal

Last updated 2 years ago