Mr.Trunk · @mrtrunk
7 followers · 15418 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
7 followers · 15320 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
7 followers · 15215 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
7 followers · 15115 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
7 followers · 15013 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
7 followers · 14912 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
7 followers · 14608 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
6 followers · 14507 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
6 followers · 14305 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
6 followers · 14204 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
6 followers · 14103 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
6 followers · 14002 posts · Server dromedary.seedoubleyou.me
Just Another Blue Teamer · @LeeArchinal
90 followers · 145 posts · Server ioc.exchange

The threat actor is the focus of this by ThreatMon | Advanced Threat Intelligence Platform. This time they were targeting G20 members with a sophisticated phishing emails that deploy a downloader. Enjoy and Happy Hunting!

Link in comment!

***Switching things up a bit this time: Take a look at the MITRE ATT&CK Tactic of Discovery and let me know what commands and information you can see from the article. [Hint: Look for the memory]***

TA0001 - Initial Access
T1566.001 - Phishing: Spearphishing Attachment

TA0002 - Execution
T1204.002 - User Execution: Malicious File

TA0003 - Persistence
T1053.005 - Scheduled Task/Job: Scheduled Task

TA0007 - Discovery
T1082 - System Information Discovery
T1518.001 - Software Discovery: Security Software Discovery

TA0005 - Defense Evasion
T1027 - Obfuscated Files or Information

#sharppanda #readoftheday #cybersecurity #itsecurity #infosec #blueteam #threatintel #threathunting #ThreatDetection #happyhunting

Last updated 1 year ago

Redhotcyber · @redhotcyber
428 followers · 706 posts · Server mastodon.bida.im

Gli hacker di Sharp Panda stanno prendendo di mira le agenzie governative asiatiche

Il gruppo di hacker di sta prendendo di mira le agenzie governative in Vietnam, Thailandia e Indonesia con una nuova versione di chiamata .

Nella sua nuova campagna, Sharp Panda utilizza e-mail di phishing con allegati dannosi sotto forma di file .docx. Questi sono necessari per implementare la suite e compromettere il attraverso note.

redhotcyber.com/post/gli-hacke

#spionaggio #informatico #sharppanda #malware #soul #RoyalRoad #sistema #vulnerabilità #redhotcyber #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #CyberSecurityAwareness #cybersecuritytraining #CyberSecurityNews #privacy #infosecurity

Last updated 1 year ago

Josh Lemon · @joshlemon
135 followers · 40 posts · Server infosec.exchange

This is a very detailed analysis on the group's use of the framework, used to recently target Southeast Asian government entities.

Check Point Report: research.checkpoint.com/2023/p

#sharppanda #apt #soul #malware #dfir

Last updated 1 year ago