🚨 Watch out for the Vietnamese threat actor known as MrTonyScam. They're launching wide-reaching Facebook Messenger spam attacks with dangerous attachments. Stay vigilant!

labs.guard.io/mrtonyscam-botne

#facebookmessenger #Malware #threatactor #CyberSecurity

Last updated 1 year ago

MISP · @misp
998 followers · 108 posts · Server misp-community.org

Another excellent playbook from @cudeso "Threat actor profiling" to explore MISP galaxies and clusters and discover TA associated TTPS, indicators and vulnerabilities and even TAXII-ing towards MITRE ATT&CK repository.

🔗 github.com/MISP/misp-playbooks

For more playbooks github.com/MISP/misp-playbooks

@mitreattack

#cti #misp #opensource #threatintelligence #threatintel #threatactor

Last updated 1 year ago

Manuel Bissey · @mbissey
30 followers · 459 posts · Server cyberplace.social

Cybersecurity researchers have discovered previously undocumented payloads associated with a Romanian named Diicot, revealing its potential for launching distributed denial-of-service attacks☝️👩‍💻

thehackernews.com/2023/06/from

#threatactor #ddos

Last updated 1 year ago

IAintShootinMis · @iaintshootinmis
495 followers · 375 posts · Server digitaldarkage.cc
Ultraviolet · @VioletSullivan
31 followers · 49 posts · Server risk.social

Bold method used by -showing video for proof of access and captured first by Brett Callon (@brettcallon) twitter.com/brettcallow/status

#threatactor #medusa

Last updated 1 year ago

acrypthash👨🏻‍💻 · @acrypthash
305 followers · 325 posts · Server infosec.exchange

If you have a root account on vCenter that has an expired password, would that be considered a vulnerability? Would a threat actor be able to leverage that to gain access?

#security #vmware #password #vulnerability #threatactor

Last updated 1 year ago

Joe Słowik · @jfslowik
2797 followers · 1695 posts · Server infosec.exchange

When your team catches a incident in progress and shoots it in the face, but before you can gather enough details to link the activity to a known ...

#ransomware #threatactor #cti #threatintelligence

Last updated 1 year ago

We Open Tech · @weopentech
73 followers · 220 posts · Server infosec.exchange

The alleged behind the Riot Games is now trying to auction off the source code for the game League of Legends and is taking bids starting at $1 million.

me.pcmag.com/en/security/14254

#hacker #breach #infosec #gamehacking #threatactor

Last updated 2 years ago

Joe Słowik · @jfslowik
2622 followers · 1083 posts · Server infosec.exchange

Excited to head to Lausanne in March to present on tracking and the problems therein for
insomnihack.ch/talks-2023/#GRV

#cti #threatactor #insomnihack

Last updated 2 years ago

are naturally good at because if we can figure out where you were and who you were with on Sunday, September 23, 2019 at 2:56:43am, we can definitely figure out what a is doing

#women #dfir #threatactor #infosec #threathunting #jokes

Last updated 2 years ago

has denied claims of a of 500 million users worldwide days after a news platform reported that the stolen information was being sold on the dark web.

Remember that according to a report published by Cyber News on November 26, an unknown was able to hack into the messaging application and sell the stolen information on the dark web.

I guess we'll have to wait some more to see where the truth lies.

thecyberexpress.com/whatsapp-d

#whatsapp #databreach #threatactor #cybersecurity #infosec

Last updated 2 years ago

Misuse Case · @MisuseCase
13 followers · 70 posts · Server twit.social

A related practice is plotting an “abuse case.” This is a but from the perspective of a . The user in an abuse case is the protagonist of the (“I think I am going to cause problems on purpose”).

Then of course there is the “misuse case”: what happens when a legitimate user makes a mistake with the application or system? 3/?

#infosecurity #usecase #threatactor #untitledgoosegame

Last updated 2 years ago

Sten Eikrem · @Storesteinen
43 followers · 67 posts · Server infosec.exchange

@fifonetworks I agree that the explanations in most certifications are bad. I'm currently working on and the language there is at the best of times unnecessary heavy and complicated.

I find it sad but understandable that respected online dictionaries can't tell the differences as well. Most folks can't. Its just a fact.

However would you agree that a common language and understanding of terms is crucial to have a meaningful common discussion on what to do and what to prioritise in ?

Unfortunately this is not my experience, even in the same organisations and teams.

This makes meaningful discussions in a topic already complex almost impossible.

From what I've come to understand over the years is that (and related (s)) is just one building block or component of . The other ones is the and / .

If you cannot describe these building blocks together, then you don't have a . You have something else, an , -thing . -list-of-things-todo

But please do not call it a .

When looking at the average this is what most of them contains just that - .

#crisk #risk #cyber #threat #threatactor #asset #control #vulnerability #lossevent #impact #issue #controldeviation #problem #a #something #riskregister #things

Last updated 2 years ago

woFF · @woFF
39 followers · 42 posts · Server infosec.exchange

Pretty funky investigation and response to a developing a : blog.phylum.io/disrupting-a-so

Might use the TTPs for the next threat detection test...

#pypi #supplychain #threatactor #malware

Last updated 2 years ago

Joe Slowik · @jfslowik
1330 followers · 74 posts · Server infosec.exchange

New blog from me covering -focused and methodologies applied to hunting - with the unexpected result of potentially identifying a campaign linked to . Shout out to @DomainTools, URLScan.io, and Censys.io for enabling this research!

pylos.co/2022/11/23/detailing-

#cti #threathunting #pivot #domain #dprk #threatactor #kimsuky

Last updated 2 years ago

Sten Eikrem · @Storesteinen
43 followers · 67 posts · Server infosec.exchange

@jerry Thats unfortunate, but understandable.

It seems like its not easy for folks if your not having an background from or to know that in every country there are forces working for and depending on your for .

I've always put squarly in the good category due to the great work they do and they are a great resource for community and anyone else working to improve cybersecurity in private life, companies and countries.

If you and your commuity truly is a target or interest of or community attention, I'm not sure is the right type of platform for you.

and from seems to always find a way when they focus their efforts and the massive resources anyways and from my perspective, I'm struggeling to see how blocking would make any significant in such regard.

#enterprise #military #government #good #threatactor #threatlandscape #threatmodeling #bad #cisa #infosec #nationstate #lawenforcement #intelligence #mastodon #agencies #infosecexchange #RiskReduction

Last updated 2 years ago

mrjhnsn :verified: :donor: · @mrjhnsn
165 followers · 133 posts · Server infosec.exchange

Sooo appears to have compromised the domain of someone who is not a client of mine… however, in the course of this compromise they intercepted comms between a user at this domain and a client of mine.
This external domain user was preparing to wire $400k to my client user.
The quick thinking quickly registered a misspelling of my client’s domain name, signed up for ZohoMail, and emailed the external domain user in an attempt to intercept the wire.
The ext-user noticed something was amiss and emailed my client, and while we were trying to determine what was happening, ext-user could not make phone calls from his cell… and had provided his cell to the .
The external domain’s business does not have an IT helper, staff or MSP.
Right now there are some god knows how deep in this domain and its proving very tough to get the domain owners to realize this.
SMB’s need our help.

#threatactor #threatactors

Last updated 2 years ago

@ozurie This argument cycles back around every few weeks, but unlike birdsite, here actually seems to be conducive to conversations :D

With that being said, Bad guys are going to bad guy. They were doing it before Cult of the Dead Cow released Back Orifice, and will continue long after we're all dead and gone.

As a blue teamer, I don't have the tools or time to learn everything about red teaming to be an effective adversary for myself and the things I build. I also don't work for an org with a large enough budget to bring in full time red team staff to pound on my security controls all day.

But, Metasploit is a super easy way for me to implement a control and them hammer against it with little to no additional knowledge.

It goes back to the guns argument. Are guns bad? No, at best they are amoral. But are they dangerous? Absolutely.
I'd prefer to have them than to not have them any day of the week. Same with etm,

Happy to hear any rebuttal and to work out what a better option is for this kind of security assurance testing.

#metasploit #cobaltstrike #infosec #security #redteam #threatactor #securityassurance #securitytools

Last updated 2 years ago

Dmitry Bestuzhev · @dimitribest
28 followers · 11 posts · Server infosec.exchange

Group Cards: A Encyclopedia

apt.etda.or.th/cgi-bin/aptgrou
connector available

#threat #threatactor #misp

Last updated 2 years ago

Cody Dostal :unverified: · @dostalcody
337 followers · 358 posts · Server infosec.exchange

A has claimed to have breached the U.S. Congress.

nitter.it/vxunderground/status

EDIT: Some comments are saying it looks like NJ General Assembly, not US Congress.

nitter.it/uuallan/status/15908

Since this is just claims and basic evidence, it’s definitely a questionable claim, but something to keep an eye on.

#threatactor #cybersecurity #infosec #breach

Last updated 2 years ago