canary bot · @infosec
1 followers · 4175 posts · Server canarygateway.com

Renew Your Ransomware Defense with CISA's Updated Guidance

The MS-ISAC has worked with CISA to update its Guide that you can use to strengthen your ransomware defense. - cisecurity.org/insights/blog/r

#stopransomware

Last updated 1 year ago

@IT(RSSfeed) · @atmarkit
28 followers · 8358 posts · Server chaosphere.hostdon.jp


ランサムウェアに遭ったら何すればいい? CISA、FBIらが「」ガイドの更新版を発行
atmarkit.itmedia.co.jp/ait/art

#atmarkit #rssfeed #stopransomware

Last updated 1 year ago

Jared Rimer · @jrimer2023
44 followers · 1871 posts · Server tweesecake.social
corq · @corq
240 followers · 831 posts · Server infosec.exchange
Dissent Doe :cupofcoffee: · @PogoWasRight
1312 followers · 146 posts · Server infosec.exchange
Patrick C Miller :donor: · @patrickcmiller
2378 followers · 6430 posts · Server infosec.exchange
corq · @corq
230 followers · 713 posts · Server infosec.exchange
corq · @corq
229 followers · 700 posts · Server infosec.exchange

#stopransomware

Last updated 2 years ago

corq · @corq
229 followers · 697 posts · Server infosec.exchange
corq · @corq
229 followers · 696 posts · Server infosec.exchange
corq · @corq
229 followers · 694 posts · Server infosec.exchange
corq · @corq
227 followers · 650 posts · Server infosec.exchange

#stopransomware

Last updated 2 years ago

corq · @corq
227 followers · 647 posts · Server infosec.exchange
corq · @corq
227 followers · 646 posts · Server infosec.exchange
corq · @corq
227 followers · 644 posts · Server infosec.exchange
BlueTeamSec · @blueteamsec
26 followers · 81 posts · Server infosec.exchange

: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities [/u/digicat] reddit.com/r/blueteamsec/comme

#stopransomware #blueteamsec

Last updated 2 years ago

Patrick C Miller :donor: · @patrickcmiller
2278 followers · 5178 posts · Server infosec.exchange

: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities | CISA cisa.gov/uscert/ncas/alerts/aa

#stopransomware

Last updated 2 years ago

Swapneel Patnekar · @pswapneel
76 followers · 13 posts · Server infosec.exchange

: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities

cisa.gov/uscert/ncas/alerts/aa

#stopransomware

Last updated 2 years ago

corq · @corq
220 followers · 573 posts · Server infosec.exchange

AA23-040A: : Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities us-cert.cisa.gov/ncas/alerts/a

#stopransomware

Last updated 2 years ago

TropChaud · @IntelScott
162 followers · 24 posts · Server infosec.exchange

⚠️ Cuba Ransomware resources drop ⚠️

A new ransomware advisory comes in hot to one of your intelligence channels – what are your next steps? In our latest video, we walk through our approach to a situation like this, which analysts face almost every day amid growing volumes of CTI shared in the community today youtube.com/watch?v=K1a6Mac1-y

Link to the latest @CISA @FBI alert on Cuba Ransomware, published Dec 1 (and updated just yesterday) cisa.gov/uscert/ncas/alerts/aa

Past advisories on five other highly active in targeting U.S. critical infrastructure – and many other – organizations just this year: cisa.gov/stopransomware/stopra

According to the alert, “Since spring 2022, Cuba ransomware actors have modified their TTPs and tools to interact with compromised networks and extort payments from victims.” We’re likely to see more of this “TTP evolution” theme in 2023. As adversaries continue to evolve their TTPs rapidly and often, we had the chance to write more about this trend on our blog recently: tidalcyber.com/blog/adversary-

(And here’s another piece covering TTP evolution relative to another top malware, QakBot tidalcyber.com/blog/identifyin)

In the walkthrough, we highlight metrics around threats made on ransomware “extortion blogs” as just one public data point around Cuba’s growing threat in recent months. The figures come from this incredible public dataset github.com/joshhighet/ransomwa

The rest of the walkthrough centers on our free Community Edition tool. Jump into it here: app.tidalcyber.com/. No registration is required to access a ton of features (including everything shared below) but you know the drill: you’ll ultimately find the most value with a quick email sign-up 📋

Ransomware details from app.tidalcyber.com/software/09

Technique set for Cuba TTPs published in February app.tidalcyber.com/share/6fbf9 (source: mandiant.com/resources/blog/un)

Cuba technique set based on CISA’s/FBI’s new alert: app.tidalcyber.com/share/11c63

Script to quickly convert techniques & procedures from recent into a technique “layer” json file: github.com/mitre-attack/attack

LSASS Memory technique details page, with pivots to aligned defensive capabilities, detection analytics, & tests: app.tidalcyber.com/technique/a

Cuba Ransomware report referencing LSASS Memory & Disable or Modify Tools techniques: unit42.paloaltonetworks.com/cu

Disable or Modify Tools technique details page: app.tidalcyber.com/technique/9

Final Cuba Ransomware technique time series comparison/overlay: app.tidalcyber.com/share/7631b

Dashboard we’re maintaining covering all TTPs from the alert series, currently spotlighting six high-priority ransomware and updated each time CISA publishes a new alert: app.tidalcyber.com/share/9c1f0

Join the Tidal Community Slack channel to engage with & learn from others throughout the space join.slack.com/t/tidalcommunit

Catch this and other walkthroughs on the @tidal Cyber YouTube channel youtube.com/@tidalcyber6071

#stopransomware #ransomware #cuba #mitreattack #cti #threatinformeddefense #cyberthreatintelligence #cybersecurity #osint #sharedwithtidal

Last updated 2 years ago