mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

632
comptes actifs

#happyhunting

0 message0 participant0 message aujourd’hui

Good day everyone!

Check Point Software researchers provide us a detailed report on a newly discovered malware the #StyxStealer! It is capable of "stealing browser data, instant messenger sessions from Telegram and Discord, and cryptocurrency" and contains defense evasion techniques. While the malware may be new, one technique that stood out isn't! The use of the Windows run registry key for persistence (Software\Microsoft\Windows\CurrentVersion\Run) is not.

This registry key is abused because of the function it carries with it: you can reference an executable or script or whatever you want in the registry details and it will execute once a user logs in. This removes the need for the adversary to have to social engineer or compromise a host over and over again.

Knowing that, enjoy the article and stay tuned for your Threat Hunting Tip of the Day!

Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove
research.checkpoint.com/2024/u

Cyborg Security Intel 471 #CyberSecurity #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday

Suite du fil

Once the registry key was modified and the payload linked to in the registry data, persistence was successfully gained, which enabled the adversaries repeated access to the victim. This is a great article and just the tip of the iceberg when it comes to technical details, so check it out for yourself! Enjoy and Happy Hunting!

The Updated APT Playbook: Tales from the Kimsuky threat actor group
rapid7.com/blog/post/2024/03/2

I know I share this Cyborg Security Community hunt package a lot, but it's because this behavior is extremely commonly used! It is just one of many behaviors that we help you hunt for that stand the test of time!

Autorun or ASEP Registry Key Modification
hunter.cyborgsecurity.io/resea

#CyberSecurity #ITSecurity #InfoSec #BlueTeam #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday #huntoftheday #get hunting

Rapid7 · The Updated APT Playbook: Tales from the Kimsuky threat actor group | Rapid7 BlogWithin Rapid7 Labs we continually track and monitor threat groups. As part of this process, we routinely identify evolving tactics from threat groups in what is an unceasing game of cat and mouse.

Happy Monday everyone! I hope everyone is doing well!

Researchers from Rapid7 observed some updated #TTPs and behaviors exhibited by the APT known as #Kimsuky (AKA Black Banshee or Thallium). One update to their tactics include the use of a Compiled HTML Help file, or CHM file. Rapid7 found this significant because these types of files were seen to make it past the first line of defense and then lead to its execution. Following the CHM execution, other behaviors were seen and included registry key modification of the Windows Run registry key (SOFTWARE\Microsoft\Windows\CurrentVersion\Run).

Interested in tracking malicious infrastructure but don't know where to start? Come join us March 21st at 2 PM ET where
@embee_research will step through some examples of how to do so using Censys. Sign up here! cnys.io/iu6hzj

And if you can't make it, check out the corresponsing blog instead: censys.com/a-beginners-guide-t

go.censys.comHow To Start Tracking Malware Infrastructure - Practical Examples and Tips for Beginners | Censys

#HappyMonday and it is that time again!

The The DFIR Report has released their latest report that mentions NetSupport Manager, a remote access tool that I have not heard of before. Initial access was a zip file contained a .js file which was designed to execute an encoded PowerShell command that deployed the NetSupport tool AND established persistence through the modification of the #Windows run registry key. I would go on but you are going to have to read this report for yourself! It is so full of details that I can't begin to cover them myself! Enjoy and Happy Hunting!

NetSupport Intrusion Results in Domain Compromise
thedfirreport.com/2023/10/30/n

The DFIR Report · NetSupport Intrusion Results in Domain Compromise - The DFIR ReportNetSupport Manager is one of the oldest third-party remote access tools still currently on the market with over 33 years of history. This is the first time we will report … Read More

Good day all! The Computer Emergency Response Team of Ukraine, CERT-UA reports on a targeted attack attributed to #APT28 they observed on critical energy infrastructure facility in Ukraine. It started with a #phishing email that contained a link to an archive that led to a downloaded zip file that contained three decoy JPGs and a bat file that would run on the victims computer. The BAT file would, again, open some decoy web pages, but more importantly would create a .bat and .vbs file. There was some discovery commands issued, TOR program downloaded and hidden on the victim's computer as a hidden service, and abused common ports (445,389,3389,443). Last but not least, a PowerShell script was used to collect the password hash of the account. Enjoy and Happy Hunting!

cert.gov.ua/article/5702579

Good day all! If you have been looking for technical and behavioral artifacts regarding CVE-2023-2868, look no further! Mandiant (now part of Google Cloud) takes a deep-dive into #UNC4841, a Chinese-nexus threat group, activity that shows how the group is growing in maturity and sophistication. There is a lot to learn about TTPs from this article and I hope you enjoy it as much as I did! Happy Hunting everyone!

Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
mandiant.com/resources/blog/un

#HappyMonday everyone! The DFIR Report released another amazing report, this time they provide details of an incident that started with #IcedID and ended with #Nokoyawa #ransomware. Interesting enough, it was a malicious EXCEL doc this time that used utilized a VBA macro to download the payload. Enjoy and Happy Hunting!

IcedID Macro Ends in Nokoyawa Ransomware
thedfirreport.com/2023/05/22/i

Notable MITRE ATT&CK TTPs:
The DFIR team did all the hard work on this one!

Happy Friday everyone, not only did we make it to the end of the week but to the end of March! Today's #readoftheday is brought to you by Proofpoint. They report on a threat actor, #TA473 (aka Winter Vivern & UAC-0114) and how they leveraged a vulnerability in public facing Zimbra hosted webmail portals to conduct espionage campaigns against NATO personnel. I hope you have a wonderful weekend and Happy Hunting!

Exploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe
proofpoint.com/us/blog/threat-

ProofpointExploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe | Proofpoint USKey Takeaways Proofpoint has observed recent espionage-related activity by TA473, including yet to be reported instances of TA473 targeting US elected officials and staffers.

Good day everyone! I normally try to have my posts focus on other researchers, developers, and community members successes but today I am going to take the time to put myself in the spotlight.

Ever since landing at Cyborg Security the passion to train our customers and the community on the topic of threat hunting has been my number one focus and that passion has been my main driver in the past year. So I set myself a goal and I wanted to apply to be a trainer at #BlackHat in 2023. I didn't know if I was going to get accepted or not, but it was a goal to get a plan and training path in place, which was met, I applied to be a trainer.

What I did not expect was to be accepted! So it is my great honor and privilege to be able to train whoever is willing to register for my 2-Day training session at #BlackHat2023! I cannot wait! See you there and Happy Hunting!

blackhat.com/us-23/training/sc

www.blackhat.comBlack HatBlack Hat