Alex

35 posts

Alex

Alex

@AepEap

Katılım Şubat 2013
444 Takip Edilen85 Takipçiler
Alex
Alex@AepEap·
@TLP_R3D @SentinelOne When I have tried detecting traffic towards these kind of destinations in the past on customer networks it has been way too noisy, I'm curious if there's any additional network indicator raising how suspicious it is. Maybe it is one of those cases which needs endpoint presence.
English
0
0
0
195
Chris Duggan
Chris Duggan@TLP_R3D·
🔍 Hunting Abused Visual Studio Code Tunnels - first reported by @SentinelOne 🌉🔧 Threat actors are cleverly using Visual Studio Code tunnels and Microsoft Azure's infrastructure for command and control (C2), 🕵️‍♂️ masking their espionage activities under the guise of regular traffic. Reported Targets according to SentinelOne large business-to-business IT service providers in Southern Europe 😱 Recent Research revealed an uptick in this exploitation: Hunt Rule👉 HTTP/1.1 404 Not Found Date: GMT Content-Type: text/html Content-Length: 548 Connection: keep-alive X-Served-By: Strict-Transport-Security: max-age=31536000; includeSubDomains ssl.jarm:"2ad2ad0002ad2ad00042d42d00000023f2ae7180b8a0816654f2296c007d93" ssl:"Kubernetes Ingress Controller Fake Certificate" Some of the Interesting Finds - 👾Malicious Files: ⚡️Ghost.exe (SHA256: 7577262fc95eb1cd41448a817e9bf4cdf4c235ba5db83cb4992eb9b766ffb452) from 20.207.70.99. 💀 ⚡️payload.apk (Metasploit for Android, SHA256: d44bf340d946526fd3e623f724c283d8e1d089c5f120f9cc7c143546a3dd52ee) from 20.120.56[.]11. 🤖 👾Suspicious Reconnaissance: ⚡️Train%20Lag%20Setup%200.2.0.exe (SHA256: dcc411998cf6a8c7108bdd6987d72a42e6ed463d5ece97730c19bb3b9c49e1ec) linked to IPs 20.69.79[.]91 & 20.85.77[.]48, showing potential system reconnaissance. 🚂🔎 🌐 Multiple IPs listed are potentially involved in this campaign. 20.103.221[.]187 -Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels reported by sentinelone. Stay vigilant. 🔒 sentinelone.com/labs/operation…
Chris Duggan tweet media
English
10
77
325
24.9K
Greg Lesnewich
Greg Lesnewich@greglesnewich·
@AepEap yeah! we see that particular PDF theme (different hash) used in campaigns targeting that same sector, that are high conf TA421/APT29 the infection chain (PDF-URL-ZIP) particular HTA usage, and the use of compromised infrastructure are all similar to TA421 campaigns as well :)
English
1
0
1
115
Alex
Alex@AepEap·
@t3ft3lb Nice! What is the attribution based on?
English
1
0
13
183
Alex retweetledi
nao_sec
nao_sec@nao_sec·
New blog post! "GroundPeony: Crawling with Malice". We updated nao_sec's blog after a long time😎 nao-sec.org/2023/08/ground…
nao_sec tweet medianao_sec tweet medianao_sec tweet medianao_sec tweet media
English
2
31
70
11.5K
Alex
Alex@AepEap·
@MichalKoczwara I understand there's some satisfaction from teaching others about techniques not spoken about much in public, but burning queries for many different malware families reduces detection capabilities long-term with very limited benefits.
English
1
1
2
6.1K
Michael Koczwara
Michael Koczwara@MichalKoczwara·
Last night APT10, APT28, APT29, APT41, and FIN7 DM me here on Twitter and said that my tweets revealed their poor opsec practices so now they will make a few changes: Changes: APT28 is not going to use Cobalt Strike anymore and they will use Koadic C3 from today. APT29 Cobalt Strike watermark is going to be changed from 1359593325 to 1337. APT10 infra is going to be hosted on Digital Ocean only. APT41 is changing all default C2 certifications from Major Cobalt Strike to Minor Cobalt Strike. FIN7 will not use RDP for lateral movements anymore and will use only SSH. So you have to track them now all from the beginning! Sorry about that 🤷‍♂️
English
11
75
391
86.1K
Alex
Alex@AepEap·
@4rchib4ld I think its useful to manually be able to create network graphs which are pedagogical rather than the mess automatically generated graphs often are. But driving the investigations by working within Matltego transforms results in messy large graphs.
English
1
0
0
0
4rchib4ld
4rchib4ld@4rchib4ld·
Am I the only one not liking to use Maltego when I do investigations ? It feels so unresponsive and hard to use :(
English
3
0
3
0
Stephan Berger
Stephan Berger@malmoeb·
1/ #ThreatHunting: In a compromised network, we saw the following request in the proxy logs: www.advanced-ip-scanner[.]com/checkupdate.php?[..] This scanner is trendy among ransomware groups and has been mentioned in reports by @TheDFIRReport, among others. [1] 🧵
English
11
118
354
0
Alex
Alex@AepEap·
@campuscodi 142.4.123.192 likely instance over HTTPS.
English
0
0
0
0
Alex
Alex@AepEap·
@DCSecuritydk @cyb3rops Well its a cost-effective complement in diverse environments when implemented right. If the FP rate is too high the IOC should be excluded automatically. I can understand vendors not taking the IP route as a higher FP rate is generally seen as less acceptable by customers.
English
0
0
0
0
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
I wonder how many hours / days / weeks of analyst time was wasted on outdated IOCs, especially IPs that now have completely different owners #IOCs
Florian Roth ⚡️ tweet media
English
31
94
544
0
Alex
Alex@AepEap·
@MadeleyJosh @netresec @cyb3rops I can understand the choice to not publish victim IPs as IOCs even though there are organizations which can perform additional analysis on such data and enable collaborated attribution :)
English
1
0
0
0
Josh Madeley
Josh Madeley@MadeleyJosh·
@netresec @cyb3rops No high fidelity IOCs, but the QUIETEXIT/dropbear SSH handshake would be pretty quiet. Even outbound SSH monitoring tends to be pretty quiet and easy to verify legitimate traffic. Hundreds of gigabytes over SSH to a single IP in a month stands out when you are looking for it.
English
2
0
2
0
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
I guess most people don't know how easy it is to run automatic forensic investigations on any(!) appliance that offers a shell with THOR Thunderstorm & the various collectors nextron-systems.com/thor-thunderst… Example w/ RaspberryPi twitter.com/cyb3rops/statu… Example w/ my old Synology NAS
Florian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet media
Florian Roth ⚡️@cyb3rops

Testing THOR Thunderstorm's build for ARM processors on a RaspberryPi 4 (model B; 4GB RAM, 4 CPU cores) processing 300-400 samples per minute Test setup for an ICS customer that would like to deploy scanning services in multiple network segments nextron-systems.com/thor-thunderst…

English
4
25
160
0
Alex
Alex@AepEap·
@craiu Effective ioc ingestion into threat detection engines require automatic sanity checks and constant manual tuning in order to provide effective detection output. But yes, listing shared hosts as IOCs shows a lack of understanding how the indicators are applied later on...
English
0
0
0
0
Costin Raiu
Costin Raiu@craiu·
So many public IOCs, including from reliable sources (eg. security agencies, Govcert's) contain unreliable information. In this case below, 192.64.119[.]190 is a Namecheap Parking IP with over 6000 distinct hosts on it. Import into an IDS to generate tons of false hits.
Costin Raiu tweet media
English
10
42
141
0
Alex
Alex@AepEap·
@aRtAGGI @h2jazi Would you be able to comment on what specifically in the C2 infrastructure overlaps between the two?
English
0
0
0
0
Digital_Monet
Digital_Monet@aRtAGGI·
@h2jazi This same malware was observed in phishing targeting EU diplomatic orgs during the US withdrawal from Afghanistan. The c2 of this payload had overlap with the historic APT group Symantec called Scarab ebook.port25[.]biz. I called it malware PoppyDreams.
English
2
1
11
0
Jazi
Jazi@h2jazi·
This seems like a new attack targeting #Ukraine 1af894a5f23713b557c23078809ed01c Про збереження відеоматеріалів з фіксацією злочинних дій армії російської федерації.rar (About preservation of video materials with fixing of criminal actions of army of the Russian Federation)
Jazi tweet mediaJazi tweet mediaJazi tweet media
3
26
55
0
Alex
Alex@AepEap·
@KorbenD_Intel It could be a new actor using it as the SSH key has changed and the previous CS instance were last indexed at 2019-02-18 and then started being active 2021-06-23 with a different C2 header (based on Shodan historical data).
English
0
0
1
0