Microsoft DART

23 posts

Microsoft DART

Microsoft DART

@MicrosoftDART

We are the Microsoft Detection and Response Team. All things #DFIR #IncidentResponse

가입일 Mart 2022
3 팔로잉2.1K 팔로워
Microsoft DART
Microsoft DART@MicrosoftDART·
The Unified Audit Log can help build a full story of a threat actor’s activity in #Office365, but its sheer size and detail can be daunting. Are you equipped to hunt through this forensic artifact effectively? Read our latest blog to find out: techcommunity.microsoft.com/t5/microsoft-s…
English
1
43
80
10.2K
Microsoft DART
Microsoft DART@MicrosoftDART·
If you are in the security research or response field and interested in attending, please submit an application as soon as possible. Applications close January 6, 2023, or when all available passes have been allocated. Full details can be found here: msrc-blog.microsoft.com/2022/12/02/blu…
Microsoft Security Response Center@msftsecresponse

📢 BlueHat 2023: Applications to Attend are NOW OPEN! 📢 If you are interested in attending @MSFTBlueHat in Redmond, WA, USA, Feb 8-9, 2023, please submit your application here: forms.office.com/Pages/Response… (Applications close Jan 6, 2023)

English
0
0
0
0
Microsoft DART 리트윗함
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Threat actors are known to use malicious IIS extensions to open persistent backdoors in servers. As a follow up to a blog on these threats, the Microsoft Detection and Response Team (DART) provides tips on logging and monitoring: msft.it/6016eP7ZM
English
2
93
177
0
Microsoft DART 리트윗함
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Threat actor tactics to bypass controls and compromise tokens present additional challenges to defenders. Microsoft DART outlines strategies for organizations to detect, mitigate, and respond to threats of this nature: msft.it/6017dauVN
English
1
65
82
0
Microsoft DART 리트윗함
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
This post-incident report details some of the TTPs seen in a recent ransomware incident. Learn about best practices from Microsoft Detection and Response Team (DART): msft.it/6016dVE1K
English
2
70
107
0
Microsoft DART 리트윗함
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft has detected social engineering campaigns targeting employees of orgs across industries in the US, UK, India, Russia. MSTIC attributes the campaigns to North Korea-based actor ZINC, which used multiple weaponized open-source software. More info: msft.it/6018d8lvr
English
2
172
288
0
Microsoft DART
Microsoft DART@MicrosoftDART·
Our latest blog details findings our investigation in partnership with Microsoft Threat Intelligence Center (#MSTIC) on the cyberattacks against the Albanian government in mid-July. Read more: microsoft.com/security/blog/…
English
0
3
6
0
Microsoft DART 리트윗함
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft Detection and Response Team (DART) was engaged to lead the investigation on destructive cyberattacks launched against the Albanian government in mid-July. We assess that the attack was launched by an Iranian state-sponsored actor. Full report: microsoft.com/security/blog/…
English
2
155
329
0
Microsoft DART 리트윗함
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft has been tracking Iranian actor PHOSPHORUS’ ransomware sub-group known as DEV-0270, aka Nemesis Kitten. The group is responsible for multiple attacks typically using high-severity vulnerabilities to gain access. TTPs and more in our latest blog: microsoft.com/security/blog/…
English
2
125
212
0
Microsoft DART
Microsoft DART@MicrosoftDART·
Successful fall/winter 2022 graduate applicants will have a start date in August 2023.
English
0
0
0
0
Microsoft DART 리트윗함
GlobesEnglish
GlobesEnglish@GlobesEnglish·
How threat intelligence became key to Microsoft's computer security – ift.tt/RXPeTZj
English
0
1
3
0
Microsoft DART 리트윗함
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft has discovered a post-compromise capability we’re calling MagicWeb, which the threat actor tracked as NOBELIUM is using to maintain persistent access to environments they have compromised. In-depth technical analysis and hunting guidance here: msft.it/6016jeB4i
English
2
303
504
0
Microsoft DART 리트윗함
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft has disrupted activity by SEABORGIUM, a Russia-based actor launching persistent phishing, credential and data theft, intrusions, and hack-and-leak campaigns tied to espionage. More details + TTPs in this MSTIC blog: msft.it/6018jVwFO
English
2
173
296
0