Ayush Anand

551 posts

Ayush Anand banner
Ayush Anand

Ayush Anand

@Securityinbits

I tweet about my learning in Malware analysis, Threat Intel, Detection engineer and DFIR journey. Opinions are mine only!

Join 150+ readers → 가입일 Eylül 2015
292 팔로잉1.5K 팔로워
고정된 트윗
Ayush Anand
Ayush Anand@Securityinbits·
Ever seen ssh.exe on a workstation and ignored it? Attackers abuse SSH remote tunneling to hide lateral movement and proxy traffic through the victim host. - Simple Sigma rule "Port Forwarding Activity Via SSH.EXE" - Correlating process and network events in MDE can expose the activity inside the tunnel.
Ayush Anand tweet mediaAyush Anand tweet mediaAyush Anand tweet media
English
2
31
149
11.2K
Ayush Anand
Ayush Anand@Securityinbits·
Sigma rules to detect the discover recon cmds: - Potential Recon Activity Via Nltest.EXE - Group Membership Reconnaissance Via Whoami.EXE - Suspicious Group And Account Reconnaissance Activity Using Net.EXE youtu.be/4xpP2yLYNoE
YouTube video
YouTube
English
0
0
0
106
Ayush Anand
Ayush Anand@Securityinbits·
nltest, whoami, net.exe. Individually normal. Together within seconds? That pattern often shows pre-ransomware AD discovery. I simulated it with Adaptix C2 and watched Sigma alerts fire in Elastic. Process tree tells the real story. Breakdown in the lab video. 👇
English
1
0
5
466
Kostas
Kostas@Kostastsale·
Today I’m launching Threat Hunting Labs. Over the years I’ve analyzed many real-world intrusions. One thing became obvious: most training platforms don’t resemble how investigations actually happen. So I built something different. Threat Hunting Labs focuses on investigation-driven learning using real telemetry and structured investigative paths. If you want to get better at investigating breaches, you should practice investigating breaches. More details here: threathuntinglabs.com/blog/introduci…
English
21
115
588
45K
Ayush Anand
Ayush Anand@Securityinbits·
Still converting Sigma rules to Elastic one by one? 😵‍💫 Here’s how I batch-converted entire rule packs into Kibana NDJSON in one shot. 🔹 sigma-cli setup 🔹 Understanding targets + pipelines 🔹 Using the elasticsearch backend 🔹 Exporting rules to NDJSON securityinbits.com/detection-engi…
English
0
2
3
253
Ayush Anand
Ayush Anand@Securityinbits·
@nas_bench KQL Query: DeviceNetworkEvents | where Timestamp > ago(1h) | where InitiatingProcessFileName =~ "ssh.exe" | where InitiatingProcessCommandLine contains "-R" | order by Timestamp asc
English
0
0
0
150
Ayush Anand 리트윗함
Ayush Anand
Ayush Anand@Securityinbits·
Ever seen ssh.exe on a workstation and ignored it? Attackers abuse SSH remote tunneling to hide lateral movement and proxy traffic through the victim host. - Simple Sigma rule "Port Forwarding Activity Via SSH.EXE" - Correlating process and network events in MDE can expose the activity inside the tunnel.
Ayush Anand tweet mediaAyush Anand tweet mediaAyush Anand tweet media
English
2
31
149
11.2K
Ayush Anand
Ayush Anand@Securityinbits·
@HALNine9sRel1k Agree, there will be false positive. But we can tune those based on the remote IP.
English
0
0
0
17
Ayush Anand 리트윗함
Karsten Hahn
Karsten Hahn@struppigel·
New blog: Using LLMs the right way for malware analysis 💡Tips for building an autonomous AI analysis lab on a 12 yo laptop and getting stuff done faster without loss of accuracy. blog.gdatasoftware.com/2026/03/38381-…
Karsten Hahn tweet media
English
8
129
439
35.9K
Ayush Anand
Ayush Anand@Securityinbits·
Think those AD discovery commands are just admin noise? That’s how Akira slips in.👀 I mapped common discovery cmds + classic LSASS dump via comsvcs.dll into focused Sigma rules. 6 detections that surface hands-on-keyboard before encryption starts.
Ayush Anand tweet mediaAyush Anand tweet media
English
0
3
9
406
I am Jakoby
I am Jakoby@I_Am_Jakoby·
My 3rd and final stage of the job interview is tomorrow Spoiler alert: I already know im getting the job What does that mean for you guys? If you guessed that it means I'll be releasing all my powershell for hackers courses for free you are correct. Im proud of you. I dont care about being rich. I wanna make sure my house is never in danger of being in foreclosure again, and I want to be able to spoil my 33 cats! Nothing else matters, and this job will guarantee both of those things. Ive never been happier in my life. not to mention i currently have 2 github and 2 microsoft bounties in triage and i stand to make some decent money im blessed, and everyone should have access to education. This has always been the dream
I am Jakoby tweet media
English
70
26
438
17K
Ayush Anand
Ayush Anand@Securityinbits·
@vxunderground Now someone will publish an article claiming AI boosted threat actor productivity and speed by 1000%. 😀
English
0
0
0
259
vx-underground
vx-underground@vxunderground·
Sigh Threat Actors are using AI to do blog posts on Threat Actor forums. You can immediately tell by the grammar, the segments (what it does, how the chain works), and the chronic usage of em dash.
vx-underground tweet media
English
29
30
340
25.3K
Ayush Anand
Ayush Anand@Securityinbits·
I wanted to know which ransomware TTPs defenders should actually prioritize. So I analyzed a ransomware. live dataset (unique victim per group). Result 👇 2025: 1. Qilin 2. Akira 3. Cl0p 4. Play 2026 YTD: Qilin still #1 Akira dropped to #4
Ayush Anand tweet media
English
0
0
1
220
Ayush Anand
Ayush Anand@Securityinbits·
Reading the same @TheDFIRReport again & again to understand for my upcoming YT video. Drew my first Excalidraw diagram inspired by @fr0gger_ -> Visual Threat Intelligence book - game changer for understanding & explaining attack chains clearly. Next time I’m starting with visuals right away 😀
Ayush Anand tweet mediaAyush Anand tweet media
English
1
1
6
252
Ayush Anand
Ayush Anand@Securityinbits·
Saw Microsoft's blog on active SolarWinds Web Help Desk exploitation. Attackers dumping NTDS.dit... using print.exe Wrote a simple Sigma rule → tested in my Elastic lab Fires clean on the LOLBin abuse ✅ Detect this variant + similar print.exe abuse: Sigma rule 👇
Ayush Anand tweet mediaAyush Anand tweet media
English
1
1
3
104