Bojack Trojan Horseman

30 posts

Bojack Trojan Horseman

Bojack Trojan Horseman

@BojackTrojan

I Feel Like My Life Is Just A Series Of Unrelated Wacky Adventures

Katılım Ağustos 2020
111 Takip Edilen24 Takipçiler
Nasreddine Bencherchali
Nasreddine Bencherchali@nas_bench·
@SecurityAura - Code shared as screenshots - Samples that do not exist on the internet - IOC section containing only IPs half of them are already pointing to something else - And the blog has 20K words
English
3
1
30
13.8K
Nasreddine Bencherchali
Nasreddine Bencherchali@nas_bench·
I swear these CTI teams be spending mad time discussing the naming and the art of the APT they're gonna talk about and zero time on the actual IOCs and a good format to share them 😒
English
5
5
50
8.7K
caroline wheeler
caroline wheeler@cazjwheeler·
BREAKING: Jeremy Hunt has been caught in a secret recording during a private meeting with Tory activists suggesting that Sunak will call a general election once inflation has fallen below three per cent - giving the strongest hint yet that a poll will be held next autumn.
English
390
1.2K
4K
1.8M
Bojack Trojan Horseman
Bojack Trojan Horseman@BojackTrojan·
@iblametom Red teams using it and criminals using it is not mutually exclusive (and Crowdstrike never said it was criminal here, a RT is a threat actor). There are well documented cases of known APT and criminal groups using Brute Ratel C4.
English
0
0
1
108
Bojack Trojan Horseman
Bojack Trojan Horseman@BojackTrojan·
@ImposeCost Not directly related to intelligence (but touches on it at times), but "Once Upon a Time in Northern Ireland" docuseries by the BBC is fantastic and the best if you're looking to learn about the history of The Troubles more.
English
0
0
1
205
vx-underground
vx-underground@vxunderground·
Let's talk about ransomware for a second. Ransomware Threat Actors are opportunity driven. They do not have specific targets in mind. If you've got a dollar, they want it. The reality of the matter, in the ransomware ecosystem, is initial access brokering is cheap and affordable, it is a worthwhile investment for ransomware affiliates to establish a good relationship with an initial access broker. There is an initial access broker who will sell you roughly 1,000,000 misconfigured VPN's for $1,500. These 'misconfigured' VPNs typically will be companies which have accidentally set a VPN user login to something like 'test' as the username AND password. Although this may sound absurd, or unlikely, these are extremely common as companies may simply overlook small errors. However, these misconfigured VPNs are not curated. Ransomware affiliates might have to spend weeks, or months, sorting through the list determing which companies discovered have: 1. Money 2. Do not violate the rules of the ransomware group 3. Have insufficient security posture 4. Are outside with CIS (ex-soviet countries). This is often how ransomware groups collide with each other. Two different initial access brokers may have identified (or gotten access) to the exact same organization and then sold this identified vulnerable organization, or access, to two different ransomware groups. There have been stories where ransomware affiliates gain access, only to discover upon entry the organization has already been ransomed! Companies that have correctly configured EDRs (a detected blue team), a SOC, and have good policy and/or asset control will defeat most ransomware affiliates. More often than not, if an affiliate encounters a company that has a good EDR, or hardened machines, they may simply abandon the target all together (or sell it to a different ransomware operator) because it may not be worth their time. Metaphorically speaking, time is money to the Ransomware Threat Actor. Regarding targets, there is another aspect often overlooked. Ransomware operators residing outside NATO often do not understand the culture or targets they have identified. For example, we have witnessed ransomware groups target public school systems, failing to understand how the United States allocates money for schools. They mistakenly believe tax-funded schools are ripe with cash and simply do not believe negotiators when they say the victim doesn't have the money. They rely on publicly available information (often wrong information) from places like Wikipedia or ZoomInfo. They see big numbers and believe that this is the profit margins. tl;dr if you very seriously want to defeat ransomware, security companies need to understand the financial limitations many organizations face. They do not have the money, or man power, larger companies have to combat an ever evolving threat landscape. NOTE: There are some caveats to this rant. Every ransomware affiliate will seek different avenues of gaining access. Blah, blah, blah. Thanks for reading. Have a goodnight (or morning).
English
25
253
1.1K
202.2K
Bojack Trojan Horseman
Bojack Trojan Horseman@BojackTrojan·
@lordx64 This is my last reply as this is going in circles and you're constantly changing your argument. They're claiming it's likely a CN APT. They're not claiming that due to observed minimal overlap with Violet Typhoon as you keep saying. You're misunderstanding that part of the report
English
1
0
0
31
Bojack Trojan Horseman
Bojack Trojan Horseman@BojackTrojan·
@lordx64 It could mean they use shared infrastructure procurement anonymization networks but are distinct groups (something extremely common among CN APTs). Distinct groups can still have overlap for this reason. They should have been more specific in what the observed overlap was. (2/2)
English
1
0
0
25
Bojack Trojan Horseman
Bojack Trojan Horseman@BojackTrojan·
@lordx64 They're quite clearly not claiming that because of observed minimal overlap with Violet Typhoon therefore STORM-0558 is Chinese APT like you're suggesting. "Minimal overlap" can mean lots of things. (1/2)
English
2
0
0
66
Bojack Trojan Horseman
Bojack Trojan Horseman@BojackTrojan·
@lordx64 Yes, rereading your other reply to another user in this thread I think you're misunderstanding what they are saying regarding this minimal overlap part.
English
1
0
0
32
Bojack Trojan Horseman
Bojack Trojan Horseman@BojackTrojan·
@lordx64 It's just saying it's likely a distinct activity group to Violet Typhoon but acknowledging some minimal degree of overlap (which is very common among Chinese APTs due to shared infrastructure and other procurement chains). Really struggling to understand your point around that.
English
1
0
0
34
Taha ז
Taha ז@lordx64·
@BojackTrojan can you share any reference material/reporting indicating that Storm-0558 targeted the Uyghur?
English
1
0
0
195
Bojack Trojan Horseman
Bojack Trojan Horseman@BojackTrojan·
@lordx64 The piece is clearly not intended to lay out all of their country attribution evidence as you seem to be insinuating. You've also left out the historical targeting of Uyghur and Taiwan-linked entities specified in the blog.
English
1
0
0
205
phr00ts
phr00ts@phr00ts·
@sherrod_im How about get them all on one naming convention. I don't know if TA7839 is the same as sparkle unicorn kitty or lotus blossom panda express. I get you gotta have cool marketing but FFS.
English
1
0
2
163
💻 Sherrod DeGrippo
💻 Sherrod DeGrippo@sherrod_im·
I am going to convince the entire threat intelligence industry that naming threat actors neutral and even silly names is better than glorifying them with Hollywood villain style praise names.
English
48
18
253
29.4K
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
"USAgent": fce66c26deff6a5b7320842bc5fa8fe12db991efe6e3edc9c63ffaa3cc5b8ced MACMA with US targeting? 🤔
MalwareHunterTeam tweet mediaMalwareHunterTeam tweet mediaMalwareHunterTeam tweet media
English
2
5
11
6K
Bojack Trojan Horseman
Bojack Trojan Horseman@BojackTrojan·
@cisonaut @ImposeCost Actor says ok well I'll just not use malware then and then industry doesn't report on them because they only know how to look for malware. Actor happy. (2/2)
English
0
0
0
40
Bojack Trojan Horseman
Bojack Trojan Horseman@BojackTrojan·
@cisonaut @ImposeCost Industry prioritizes looking for new shiny malware families that actors take ages developing to the detriment of other collection methods and report on them constantly. Actor sad. (1/2)
English
1
0
0
46