解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 40 – 2023 - THREAT INTELLIGENCE/HUNTING

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

THREAT INTELLIGENCE/HUNTING

Adam at Hexacorn

Posted on 2023-09-29 by adam I really don’t know if this is the first post in the series, or just a one-off that is also, the last. There are many fantastic blog posts out there that deal with the most popular Linux persistence tricks, f.ex. here. The latter is one of the best resources on Linux persistence that I know of, so I encourage everyone to read it first…. So, why starting something new, here? Truth be told that I was never the biggest user of Linux, but same as it is with macOS – their...

Adam Goss

Adam Goss·Follow7 min read·6 days ago--ShareGood books on cyber threat intelligence are rare. Good books that craft visual illustrations to distill complex topics are even rarer. Visual Threat Intelligence by Thomas Roccia does both incredibly well.Visual Threat Intelligence: An Illustrated Guide for Threat Researchers is an introductory book to the murky world of cyber threat intelligence (CTI). It familiarizes readers with the basics of threat intelligence, threat actors, indicators of comprom...

Allan Liska at ‘Ransomware Sommelier’

ransomwaresommelier.comCopy linkFacebookEmailNotesOtherDiscover more from RansomwareMy thoughts about ransomwareSubscribeContinue readingSign in Is Securing PowerShell a Lost Cause?Part 2 of a 3 Part SeriesAllan LiskaSep 27, 20231Share this postIs Securing PowerShell a Lost Cause?ransomwaresommelier.comCopy linkFacebookEmailNotesOtherShareCheck out Part 1 of this series here.Before I begin, I have to thank Helen for the cool new email banner. Ransomware is such a serious topic that it is nice to...

Anton Chuvakin

Build for Detection Engineering, and Alerting Will Improve (Part 3)Anton Chuvakin·FollowPublished inAnton on Security·4 min read·2 days ago--ListenShareThis blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.In this blog (#3 in the series), we will start to define and refine our detection engineering machinery to avoid the problems covered in Parts 1 and 2.Detection Engineering is Painful — and It Shouldn’t Be (P...

ASERT

Threat Intelligence Bulletproof Hosting (BPH) Taxonomy by ASERT Team on September 27th, 2023 IntroductionNETSCOUT's ASERT researchers began investigating Bulletproof Hosting (BPH) providers in early 2023 as a significant number of our customers experienced high-volume scans, attack traffic, and intrusion attempts from multiple well-known BPH providers. We revealed initial findings on two such providers in our 1H 2023 Threat Intelligence Report where we assessed malicious attack traffic flowing t...

Assetnote

No items found.Over the last year or so, we've seen the mass exploitation of managed file transfer software. From GoAnywhere MFT, MOVEIt, and our own work on Citrix Sharefile. The threats towards enterprises through managed file transfer software has really hit home after the recent ransomware attack by Cl0p, leveraging a series of vulnerabilities in Progress MOVEIt.When looking at one of our targets attack surface, we came across another managed file transfer software called WS_FTP. This softwa...

AttackIQ

Avanan

Preventing QR Code Phishing From Reaching the Inbox Posted by Jeremy Fuchs on September 27, 2023 Tweet Recently, we've seen a lot of news about Quishing--or QR Code phishing. This is when the link behind a QR code is malicious, but the QR code itself is not. There was a report of a major U.S. energy firm targeted by a QR phishing code. Other reports have noticed an uptick in these types of attacks. We've seen some nascent email security providers write about how they were first to market with QR...

Stealing Credentials Through Legitimate Dropbox Pages Posted by Jeremy Fuchs on September 28, 2023 Tweet Today, we’re writing about cyberattacks that occur via Dropbox. Dropbox, the popular file-sharing service, is used around the globe. Cybercriminals have figured out that they can use it to create documents that host phishing material. In the first two weeks of September, we saw 5,440 of these attacks. Here’s how it works. Someone creates a free Dropbox account. Then they create a document and...

Emma McGowan at Avast

RATs, rootkits, and ransomware (oh my!) Emma McGowan 27 Sep 2023 Perturbing highlights from the latest Avast Threat Report indicate scammers aren’t just stealing from your computer—they’re working to take it over entirely. In a vast world of online threats, certain terms can stand out for their mysterious nature and vague implications. They sound technical, jargony, and are often dismissed as too hard for us to get into. Today we’re offering a guide, a sort of compass, to help simplify a few of ...

Avertium

September 26, 2023 executive summary In a recent cyber security incident that sent shockwaves through the industry, MGM Resorts International's resorts and casinos across the U.S. were plunged into chaos by a sophisticated cyber attack. Initially believed to be the work of the notorious group known as Scattered Spider, this operation showcased an expertise in impersonation and malware deployment. As we dive into the details, it becomes clear that this attack began with a clever social engineerin...

Mark Ryland at AWS Security

by Mark Ryland | on 28 SEP 2023 | in Foundational (100), Security, Identity, & Compliance, Technical How-to, Thought Leadership | Permalink | Comments | Share Every day across the Amazon Web Services (AWS) cloud infrastructure, we detect and successfully thwart hundreds of cyberattacks that might otherwise be disruptive and costly. These important but mostly unseen victories are achieved with a global network of sensors and an associated set of disruption tools. Using these capabilities, we make...

Martin Zugec at Bitdefender

Brad Duncan at Malware Traffic Analysis

2023-09-21 (THURSDAY) THRU 09-25 (MONDAY) - EXAMPLES OF MALSPAM PUSHING AGENTTESLA REFERENCES: //twitter.com/Unit42_Intel/status/1706667528075022493 //www.linkedin.com/posts/unit42_agenttesla-iocs-threatintelligence-activity-7112433146456928256-tjfu/ NOTES: Zip files are password-protected. If you don't know the password, see the "about" page of this website. ASSOCIATED FILES: 2023-09-21-thru-09-25-AgentTesla-activity.txt.zip 3.2 kB (3,228 bytes) 2023-09-21-thru-09-25-AgentTesla-malspam-16-examp...

2023-08-31 (THURSDAY) - MALSPAM LEADS TO ICEDID (BOKBOT) REFERENCE: //twitter.com/Unit42_Intel/status/1697605312205766960 NOTES: Zip files are password-protected. If you don't know the password, see the "about" page of this website. ASSOCIATED FILES: 2023-08-31-IOCs-for-IcedID-activity.txt.zip 1.8 kB (1,791 bytes) 2023-08-31-thread-hijacked-malspam-for-IcedID-4-examples.zip 98.0 kB (98,040 bytes) 2023-08-31-traffic-for-fake-Azure-pages-2-pcaps.zip 68.7 kB (68,729 bytes) 2023-08-31-IcedID-malware...

2023-08-29 (TUESDAY) - ICEDID (BOKBOT) INFECTION WITH KEYHOLE VNC AND COBALT STRIKE REFERENCES: //twitter.com/Unit42_Intel/status/1707898425973280907 NOTES: Zip files are password-protected. If you don't know the password, see the "about" page of this website. ASSOCIATED FILES: 2023-09-28-IOCs-for-IcedID-with-KeyholeVNC-and-Cobalt-Strike.txt.zip 2.2 kB (2,172 bytes) 2023-09-28-IcedID-infection-with-Keyhole-VNC-and-Cobalt-Strike.pcap.zip 11.5 MB (11,531,911 bytes) 2023-09-28-IcedID-malware-and-ar...

Censys

CERT-AGID

Sintesi riepilogativa delle campagne malevole nella settimana del 23 – 29 Settembre 2023 29/09/2023 riepilogo In questa settimana, il CERT-AgID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento, un totale di 35 campagne malevole, di cui 32 con obiettivi italiani e 3 generiche che hanno comunque interessato l’Italia, mettendo a disposizione dei suoi enti accreditati i relativi 352 indicatori di compromissione (IOC) individuati. Riportiamo in seguito il dettaglio delle tipol...

Check Point

Filter by: Select category Research (528) Security (843) Securing the Cloud (263) Harmony (128) Company and Culture (14) Innovation (6) Customer Stories (7) Horizon (1) Securing the Network (6) Connect SASE (9) Harmony Email (32) Artificial Intelligence (13) Harmony EmailSeptember 28, 2023 Phishing via Dropbox ByCheck Point Team Share A burgeoning attack involving Dropbox is making the rounds. In the first two weeks of September, we saw 5,440 of these attacks. Hackers are using Dropbox to create...

Jossef Harush Kadouri at Checkmarx Security

Surprise: When Dependabot Contributes Malicious CodeJossef Harush Kadouri·FollowPublished incheckmarx-security·5 min read·3 days ago--ListenShareIn July 2023, we detected suspicious commits in hundreds of GitHub repositories, appearing as if contributed by Dependabot but carrying malicious code.These commit messages were fabricated by threat actors to disguise their malicious activity.Upon investigation, we confirmed that the attackers stole victims’ GitHub personal access tokens to make these m...

CISA

People’s Republic of China (PRC)-linked cyber actors known as BlackTech. BlackTech has demonstrated capabilities in modifying router firmware without detection and exploiting routers’ domain-trust relationships for pivoting from international subsidiaries to headquarters in Japan and the U.S. — the primary targets. The authoring agencies recommend implementing the mitigations described to detect this activity and protect devices from the backdoors the BlackTech actors are leaving behind. BlackTe...

Cisco’s Talos

By Jared Rittle Tuesday, September 26, 2023 08:09 Snort With more devices on operational technology (OT) networks now getting connected to wide-reaching IT networks, it is more important than ever to have effective detection capabilities for ICS protocols. However, there are a few issues that usually arise when creating detection for ICS protocol traffic. Oftentimes, the protocols connecting these devices on modern networks originate in older serial protocols. This transition resulted in protoco...

By William Largent Friday, September 29, 2023 12:09 Threat Roundup Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Sept. 22 and Sept. 29. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.As a reminder, the informa...

Michael Tremante at Cloudflare

Loading... September 29, 2023 2:00PM Michael Tremante 13 min read We are constantly researching ways to improve our products. For the Web Application Firewall (WAF), the goal is simple: keep customer web applications safe by building the best solution available on the market.In this blog post we talk about our approach and ongoing research into detecting novel web attack vectors in our WAF before they are seen by a security researcher. If you are interested in learning about our secret sauce, re...

Confiant

UPDATE: On September 27, 2023, Motorik contacted us to validate our discoveries, affirming that they had ceased their collaboration with Waytopmobi earlier in the year. We have also detected and confirmed, through our telemetry, the presence of DecenterAds, an advertising platform directly linked to ScamClub. Threat Actor Ownership Exposed This strategic threat intelligence report details the activities of threat actor ScamClub during Q1 and Q2 of 2023. For the first time, we identify the entity...

Covertshell

Strengthening Your Defense Against IdP (Identity Provider)Attacks: Leveraging Google Workspace Admin LogsCovertshell·Follow5 min read·1 day ago--ListenShareIn recent times, identity service provider (IdP) attacks have surged, impacting even major providers like Okta, Cloudflare, and Microsoft Azure AD. Microsoft has shared a highly informative article that delves into various identity-based attacks and preventive measures. It’s a must-read: Read the article here.However, in this blog post, we’ll...

Csaba Fitzl at ‘Theevilbit’

Beyond the good ol' LaunchAgents - 32 - Dock Tile Plugins September 29, 2023 8 minutes read persistence • beyond macos • persistence • beyond This is part 32 in the series of “Beyond the good ol’ LaunchAgents”, where I try to collect various persistence techniques for macOS. For more background check the introduction. When you write a series about something, there are some episodes which are less interesting, many boring stuff, but sometimes there are some true gems. While doing some research ye...

Cyfirma

Published On : 2023-09-29 Share : Ransomware of the Week CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – which could be relevant to your organization. Type: Ransomware. Target Technologies: MS Windows. Target Geography: Canada, Poland, United States. Target Industries: Construction, Law, Media & Internet, Manufacturing, Retail, Real Estate. Introduc...

DomainTools

Doug Metz at Baker Street Forensics

Creating YARA files with Python DFIR, Malware, Python, yara When I’m researching a piece of malware, I’ll have a notepad open (usually VS Code), where I’m capturing strings that might be useful for a detection rule. When I have a good set of indicators, the next step is to turn them into a YARA rule. It’s easy enough to create a YARA file by hand. My objective was to streamline the boring stuff like formatting and generating a string identifier ($s1 = “stringOne”) for each string. Normally Power...

Aleksander W. Jarosz at EclecticIQ

This issue of the Analyst Prompt discusses findings from the 2023 Europol Spotlight report, whose main feature is ransomware and distributed-denial-of-service cyberattacks because of the disruption they are causing. The report parallels current threat actor investigations by EclecticIQ analysts. Aleksander W. Jarosz – September 28, 2023 2023 Europol Spotlight Report: The Apex of Crime-as-a-Service Highlights Ransomware as the Most Prominent Threat of This Category The Internet Organized Crime As...

Bryan Geraldo at Expel

Security operations · 3 MIN READ · BRYAN GERALDO · SEP 27, 2023 · TAGS: MDR Threat hunting comes in two flavors: proactive and reactive. There are important differences, and here we explain what they are. Some history on “threat hunting” The first well-documented mention of threat hunting is in Richard Beijtlich’s (of Mandiant fame) oft-cited Information Security article from July-August 2011. In “Become a Hunter: Fend off modern computer attacks by turning your incident response team into count...

Florian Roth

Quick Insights on This Week’s Critical Software Flaws (Week 39)Florian Roth·Follow4 min read·1 day ago--ListenShareIn this week’s roundup, I’ve listed some notable vulnerabilities that caught my attention. They range from issues in libwebp to critical flaws in SharePoint, WS_FTP, and Exim. I’ve provided a brief description and included links for each, in case you want to explore further.libwebp: CVE-2023–4863, CVE-2023–41064, CVE-2023–5129CVE-2023–4863 is a heap buffer overflow vulnerability in ...

Fred Gutierrez at Fortinet

By Fred Gutierrez | September 27, 2023 A Short History Lesson In 1923, the Soviet Union created the Nagorno-Karabakh Autonomous Oblast (an oblast is an administrative region or province) within the Azerbaijan Soviet Socialist Republic. This oblast has a 95% ethnically Armenian population. In 1988, Nagorno-Karabakh declared its intention to leave Azerbaijan and join the neighboring Republic of Armenia. While the Soviet Union was able to keep the resulting tension under control, once the USSR bega...

John Althouse at FoxIO

John Althouse·FollowPublished inFoxIO·16 min read·5 days ago--ListenShareTL;DRIn this blog I go over the new JA4+ network fingerprinting methods and examples of what they can detect.JA4+ provides a suite of modular network fingerprints that are easy to use and easy to share, replacing the JA3 TLS fingerprinting standard from 2017. These methods are both human and machine readable to facilitate more effective threat-hunting and analysis. The use-cases for these fingerprints include scanning for t...

Matthew Brennan, Harlan Carvey, Anthony Smith, Craig Sweeney, and Joe Slowik at Huntress

Previous Post Next Post Share on Twitter Share on LinkedIn Share on Facebook Share on Reddit The following write-up and analysis is thanks to Matthew Brennan, Harlan Carvey, Anthony Smith, Craig Sweeney, and Joe Slowik. Background Huntress periodically performs reviews of identified incidents for pattern analysis, and leverages open and closed sources of intelligence to engage in threat hunting operations. At times, a combination of these activities—reviewing what we have already remediated and ...

Infoblox

Introducing DNS Threat ActorsSeptember 26, 2023Everyone loves a good whodunit. As the story of the recent attacks on MGM International and Caesars Entertainment unfolded, major news outlets competed to attribute an attacker to the ransomware that shut down a large portion of MGM operations. In the end, it looks like a threat actor called Scattered Spider leveraged the services of another threat actor called ALPHV, or BlackCat, to steal sensitive data and compel the company to disconnect networks...

Intezer

Written by Intezer - 26 September 2023 CountryUnited StatesCanadaAfghanistanAlbaniaAlgeriaAndorraAngolaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia and HerzegovinaBotswanaBrazilBruneiBulgariaBurkina FasoBurundiCambodiaCameroonCape VerdeCayman IslandsCentral African RepublicChadChileChinaColombiaComorosDemocratic Republic of the Congo (Kinshasa)Congo, Republic of(Brazzaville)Costa RicaCroatiaC...

Hannah Hamilton at Jamf

Start Trial Jamf Blog September 27, 2023 by Hannah Hamilton Analyzing state-sponsored malware on macOS Jamf Nation User Conference In this JNUC presentation, Ferdous Saljooki, Senior Threat Researcher at Jamf Threat Labs, takes a deep dive into malware developed by the Lazarus APT group, and their subgroup, BlueNoroff. This includes analysis of the 3CX and JumpCloud supply chain attacks, RustBucket malware and JokerSpy spyware, among others. Malware analysis tools Saljooki begins his talk explai...

Bert-Jan Pals at KQL Query

Bert-Jan Pals included in KQL Sentinel Defender For Endpoint Incident Response 2023-09-29 2274 words 11 minutes It always happens on Friday afternoon, a high severity incident is created just before you want to start your weekend. After you have triaged the incident you suspect that an threat actor gained access to your environment. From that moment questions are starting to pop up in your head; what happened on this device? Are more devices impacted? What do I need to do to contain the incident...

Casey Charrier and Jared Semrau at Mandiant

Blog Analysis of Time-to-Exploit Trends: 2021-2022Casey Charrier, Jared Semrau Sep 28, 202310 min readThreat IntelligenceZero Day ThreatsVulnerabilitiesExecutive SummaryMandiant Intelligence analyzed 246 vulnerabilities that were exploited between 2021 and 2022.Sixty-two percent (153) of the vulnerabilities were first exploited as zero-day vulnerabilities.The number of exploited vulnerabilities each year continues to increase, while the overall times-to-exploit (TTEs) we are seeing are decreasin...

MDSec

Home < Knowledge Centre < Insights < Nighthawk 0.2.6 – Three Wise Monkeys Overview See no evil, hear no evil, speak no evil. This Japanese maxim epitomises the EDRs coming up against our latest release of Nighthawk. Following copious amounts of research and development, we’re happy to release Nighthawk 0.2.6, and as is the status quo, including several new features unique to Nighthawk. Call Stack Masking Telemetry obtained from call stacks is proving to be a reliable and effective resource for d...

Oren Dvoskin at Morphisec

Posted by Oren Dvoskin on September 25, 2023 Find me on: LinkedIn Tweet The ransomware attack that hit MGM Resorts International on September 10th captured headlines due to the company’s name recognition, reputational and customer impact, and the overall magnitude of business disruption the attack caused. Three days earlier, another prominent resort, Caesars Entertainment, was hit by a cyber-attack. In response, Caesars reportedly paid an estimated $15 to $30 USD million ransom. In the case of t...

Jeff White at Palo Alto Networks

1,645 people reacted 3 18 min. read Share By Jeff White September 29, 2023 at 4:00 AM Category: Ransomware Tags: CL0P, Clop, Cortex XDR, Cortex Xpanse, Cortex XSIAM, Linux, MOVEit, torrenting Executive Summary The CL0P ransomware group recently began using torrents to distribute victim data after a successful campaign stealing data from thousands of companies. We’ll cover the reason for this shift in methodology and what this means for visibility to the outside world. CL0P has been one of the ra...

Phylum

Phylum is tracking a large typosquat campaign targeting the npm ecosystem. A user is currently publishing many typosquat packages masquerading as react and angular. As of this writing, 125 packages have been released in what appears to be an ongoing campaign. We are reporting these packages as we encounter them and have reported the Discord webhook for removal.--cta--Technical Details Inspecting the package.json we find a preinstall hook that initiates execution:{ "name": "zngularjs", "version":...

Phylum has discovered another new multi-ecosystem campaign aiming to exfiltrate sensitive machine information to a remote server. The attack has grown in both scope and complexity over the course of the past weeks and appears to be ongoing. Phylum will continue to actively monitor it, providing updates as we learn more.--cta--Background and start of campaignPhylum's automated risk detection platform first alerted us to a suspicious publication back on September 12, 2023, which, as we would later...

Red Alert

Monthly Threat Actor Group Intelligence Report, July 2023 (ENG) This report is a summary of Threat Actor group activities analyzed by the NSHC ThreatRecon team based on data and information collected from 21 June 2023 to 20 July 2023. In July, activities by a total of 25 Threat Actor Groups were identified, in which activities by SectorA groups were the most prominent by 38%, followed by SectorC and SectorJ groups. Threat Actors identified in July carried out the highest number of attacks on wor...

Matt Graeber at Red Canary

Resecurity

Solutions Products Endpoint Protection Platform Risk™ Digital Risk Monitoring Context™ Cyber Threat Intelligence EASM External Attack Surface Management VAPT Vulnerability Assessment & Penetration Testing Cyber Fusion Center Cyber Fusion Center Identity Protection Secure Your Digital Identity Threat Hunting Protect your ecosystem with Hunter Fraud Prevention Fraud Prevention and Risk Intelligence Insider Threat Protection Neutralize Insider Threats Services Digital Forensics Executive Protection...

Ashlee Benge at ReversingLabs

Ransomware-as-a-service gang ALPHV (a.k.a. BlackCat) carried out a sophisticated attack on the hotel and casino company MGM. Here’s what the ReversingLabs threat team understands. Blog Author Ashlee Benge, Director of Threat Intelligence, ReversingLabs. Read More... More than a week after it suffered a crippling ransomware attack, the hotel giant MGM is struggling to recover. The attack, linked to the ransomware-as-a-service (RaaS) group known as ALPHV, or BlackCat, caused slot machines and ATMs...

Ryan Fetterman at Splunk

Share: By Ryan Fetterman September 26, 2023 Based on the popularity of last year's Macro-level ATT&CK Trending, we’ve updated the dataset for another year’s worth of insights. This data summarizes the frequency of MITRE ATT&CK technique observations across thousands of cyber incidents over the past four years. In this post, we’ll look at the contents of the updated dataset, using Splunk to pull out trends based on this ultra large-scale attacker landscape! For this analysis, we've compiled four ...

SANS Internet Storm Center

Securelist

Spam and phishing 27 Sep 2023 minute read Table of Contents What is a QR code?Malevolent uses of QR codes in emailStatisticsTakeaways Authors Roman Dedenok QR codes are everywhere: you can see them on posters and leaflets, ATM screens, price tags and merchandise, historical buildings and monuments. People use them to share information, promote various online resources, pay for their goodies, and pass verification. And yet you don’t see lots of QR codes in email: users often read messages on thei...

Malware reports 28 Sep 2023 minute read Table of Contents IntroductionASMCryptLummaZanubisConclusionIndicators of compromise (MD5s) Authors GReAT Introduction As long as cybercriminals want to make money, they’ll keep making malware, and as long as they keep making malware, we’ll keep analyzing it, publishing reports and providing protection. Last month we covered a wide range of cybercrime topics. For example, we published a private report on a new malware found on underground forums that we ca...

Thomas Roccia at SecurityBreak

An LLM ExperimentThomas Roccia·FollowPublished inSecurityBreak·3 min read·4 days ago--ShareIn threat intelligence and cybersecurity in general, it has become difficult to keep track of everything. There are numerous excellent write-ups published daily and lot of information to process.Sometimes, I find it challenging to catch up with all the content on my reading list, so I started experimenting with a solution using LLM.Source: XKCDLarge Language Model to the Rescue.Considering the volume of re...

Simone Kraus

SOC Fortress

Executable files analysis and capabilities detection using capa (Mandiant)SOCFortress·Follow4 min read·5 days ago--ListenShareIntroReference: //github.com/mandiant/capaCapa detects capabilities in executable files.It can be run against a PE, ELF, .NET module, or shellcode files and it tells you what it thinks the program can do. For example, it might suggest that the file is a backdoor, is capable of installing services, or relies on HTTP to communicate.Capa consists of two main components that ...

Symantec Enterprise

Previously unseen version of SysUpdate used in August 2023 campaign.The Budworm advanced persistent threat (APT) group continues to actively develop its toolset. Most recently, the Threat Hunter Team in Symantec, part of Broadcom, discovered Budworm using an updated version of one of its key tools to target a Middle Eastern telecommunications organization and an Asian government.Both attacks occurred in August 2023. Budworm (aka LuckyMouse, Emissary Panda, APT27) deployed a previously unseen var...

Pierre Noujeim at System Weakness

Pierre Noujeim·FollowPublished inSystem Weakness·3 min read·6 days ago--ListenShareD3 Smart SOAR offers 12 out-of-the-box integrations with Amazon Web Services (AWS) products. These include:AWS CloudTrailAWS CloudWatchAWS EC2AWS ECSAWS EKSAWS S3AWS SQSAWS SSMAWS ECRAWS IAMAWS Security HubAWS Guard DutyIn this integration spotlight, we will focus on AWS GuardDuty and AWS Elastic Compute Cloud (EC2) to demonstrate how you can use automated playbooks to assist with asset management and incident res...

Casey Smith at Thinkst Thoughts

Publish DateSeptember 28, 2023 Casey Smith Our Cloned Website Token has been available for a long time now, both on our public Canarytokens.org site as well as for our Canary customers. It’s helped users all over the world detect attacks early in the process. We wanted to take a moment and go over some of the details of this token: how it works, how to create and use one, and critically, how it fares against the new “Adversary-in-the-Middle” (AitM)-generation of phishing attacks.. The cloned web...

Alvin Wen at Uptycs

Machine Learning in Cybersecurity Tags: Threat Hunting, Threat Research, Machine Learning Alvin Wen September 28, 2023 Share: Author Credits: Alvin Wen, Software Architect, and Craig Chamberlain, Director of Algorithmic Threat Detection Many modern standards, practices, and frameworks, including the MITRE ATT&CK matrix, emphasize the importance of discerning the unusual from the malicious in modern event logs and detections, which often contain many shades of gray between the interesting and the...

Kuldeep Pal at Walmart

Kuldeep Pal·FollowPublished inWalmart Global Tech Blog·3 min read·5 days ago--ShareThis blog covers more towards the usage of MMDB rather than the solution to the problem. I have explained the solution on high level, more details are internal to Walmart.Problem Statement:The problem at hand is the detection and prevention of illegal usage of US gift cards, which can include unauthorised balance checks from outside the US and tracking potential illegal usage within the US based usage.High-Level S...

Peter Kálnai at WeLiveSecurity

While analyzing a Lazarus attack luring employees of an aerospace company, ESET researchers discovered a publicly undocumented backdoor Peter Kálnai 29 Sep 2023 • , 29 min. read ESET researchers have uncovered a Lazarus attack against an aerospace company in Spain, where the group deployed several tools, most notably a publicly undocumented backdoor we named LightlessCan. Lazarus operators obtained initial access to the company’s network last year after a successful spearphishing campaign, masqu...

Niraj Shivtarkar and Satyam Singh at ZScaler

NIRAJ SHIVTARKAR, SATYAM SINGHSeptember 29, 2023 - 11 min read Threatlabz ResearchContentsIntroductionKey TakeawaysBasicsC2 PanelTechnical AnalysisConclusionZscaler Sandbox CoverageIndicators of Compromise (IOCs)More blogsCopy URLCopy URLIntroduction In early September, Zscaler ThreatLabz discovered a new Malware-as-a-Service (MaaS) threat called “BunnyLoader” being sold on various forums. BunnyLoader provides various functionalities such as downloading and executing a second-stage payload, stea...