IAintShootinMis · @iaintshootinmis
605 followers · 1303 posts · Server digitaldarkage.cc

am I high, did the NewYorkTimes run an article a week ago saying that the Chinese and infected water, electrical, oil, rail, and other networks with meant to cripple US Gov Mil-bases and surrounding civilian infrastructure to prevent a kinetic response to being invaded?

Are we just supposed to be ignoring that now b/c or something? Or is everything just so terrible that a trade-ally commiting what seems to be war crims just doesn't register?

#infosec #volttyphoon #OT #malware #taiwan #aliens

Last updated 1 year ago

TT · @B2
1 followers · 67 posts · Server mindly.social
TT · @B2
1 followers · 64 posts · Server masto.ai
TT · @B2
1 followers · 63 posts · Server mindly.social
TT · @B2
1 followers · 62 posts · Server masto.ai
Marcel SIneM(S)US · @simsus
185 followers · 3715 posts · Server social.tchncs.de

"Volt Typhoon": Erhöhte Wachsamkeit am Perimeter | heise online heise.de/news/Volt-Typhoon-Erh

#volttyphoon #cyberwar

Last updated 1 year ago

· @twitter
1 followers · 55961 posts · Server mstdn.skullb0x.io

Referenced link: darkreading.com/ics-ot/volt-ty
Originally posted by Dark Reading / @DarkReading@twitter.com: twitter.com/DarkReading/status

For the first time, China's nation-state hackers appear to lay the groundwork for disruptive attacks in the future. Volt Typhoon is a new chapter in state-sponsored cyberattack campaigns out of China. @jaivijayan has the story: darkreading.com/ics-ot/volt-ty

#China #volttyphoon

Last updated 1 year ago

Mufasa · @ne1for23
546 followers · 6734 posts · Server betweenthelions.link

Chinese hackers hit critical infrastructure on American military bases in , say and Western spy agencies


bbc.com/news/world-asia-657051

#guam #microsoft #volttyphoon #china #unitedstates #cybersecurity

Last updated 1 year ago

Just Another Blue Teamer · @LeeArchinal
75 followers · 128 posts · Server ioc.exchange

Living-off-the-land binaries, or LOLBINs, are processes or tools that exist within the native operating system, so no post-install configuration needed! Threat actors have abused LOLBINs for some time to blend in with normal traffic and avoid AV and EDRs. Microsoft reports that an known as recently abused these executables as well as exhibited other living-off-the-land techniques to gain initial access. Enjoy and Happy Hunting!

Notable MITRE ATT&CK TTPs:
TA0002 - Execution
T1059.003 - Command and Scripting Interpreter: Windows Command Shell
T1047 - Windows Management Instrumentation

TA0006 - Credential Access
T[Fill in the blank!]
(leave your thoughts in the comments to which technique was used)

TA0007 - Discovery
T1082 - System Information Discovery
T1016.001 - System Network Configuration Discovery: Internet Connection Discovery

TA0009 - Collection
T1005 - Data from Local System

#apt #volttyphoon #cybersecurity #itsecurity #infosec #blueteam #threatintel #threathunting #ThreatDetection #happyhunting

Last updated 1 year ago

KamenRunner · @kamenrunner
33 followers · 322 posts · Server freeradical.zone

#volttyphoon

Last updated 1 year ago

Geekmaster 👽:system76: · @Geekmaster
166 followers · 1262 posts · Server ioc.exchange
Ænðr · @aev
8 followers · 233 posts · Server mastodon.sdf.org

Oh dear. microsoft.com/en-us/security/b

will attempt to hack your network by... using tools built into and intended to make back-ups. But Microsoft blames management tools sold by third-party vendors...

#volttyphoon #mswindows #activedirectory #cybersecurity #netsec

Last updated 1 year ago

Tech news from Canada · @TechNews
569 followers · 16960 posts · Server mastodon.roitsystems.ca