DefSecSentinel

616 posts

DefSecSentinel banner
DefSecSentinel

DefSecSentinel

@DefSecSentinel

179CPT Cyber Operations Technician 170A @MOARNG

Katılım Nisan 2017
1.1K Takip Edilen2K Takipçiler
DefSecSentinel retweetledi
Samir
Samir@SBousseaden·
MiniPlasma LPE exploit works perftectly. Elastic Defend behavior protection catches the exploit primitives involved in the chain, providing detection coverage even against fresh public exploit. github.com/Nightmare-Ecli…
Samir tweet mediaSamir tweet media
English
1
40
198
12.9K
DefSecSentinel retweetledi
DefSecSentinel retweetledi
Samir
Samir@SBousseaden·
Detection guidance for CopyFail (CVE-2026-31431) and DirtyFrag (ITW Linux page cache LPE): EQL, ES|QL, and auditd detection rules and hunts included: elastic.co/security-labs/…
English
0
23
100
7.1K
DefSecSentinel
DefSecSentinel@DefSecSentinel·
Yesterday was my last day at @elastic. It was an incredible run. I’m grateful for the opportunity I was given to help build Elastic’s #macOS endpoint agent and endpoint/SIEM detections from the ground up, work that delivered real impact for customers and made life harder for the adversaries. It was truly an honor to work alongside so many talented people, and I’m very proud of everything we built together. Wishing Elastic and everyone there nothing but the best. I’ll be looking for my next adventure soon. Stay tuned!
English
4
3
51
3.1K
DefSecSentinel retweetledi
Terrance DeJesus
Terrance DeJesus@_xDeJesus·
google workspace logs from reports API... here's a simple query (Elastic) to check for the vercel 3rd-party OAuth app auth event: ``` data_stream.dataset: "google_workspace.token" and event.action: "authorize" and google_workspace.token.client\.id: 110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent\.com ``` from there, the same app ID shows up in a few other GWS fields/datastreams: - token\.app_name -> human-readable app label - drive.originating_app_id: 110671459871 -> every file the app viewed/downloaded/copied (prefix only, it's typically the GCP project number IIRC) - admin.oauth2.application\.id / .name -> admin-side OAuth approvals + domain-wide delegation grants for everything else (gmail, login, meet, chat, calendar, groups, DLP rules) I'd try actor pivot on source.user.\email + a time window around the consent event (reports API can lag up to 3 days, so go wide and check ingestion). good luck hunters! #Vercel #GoogleWorkspace #threathunting
English
0
5
12
2K
DefSecSentinel retweetledi
Elastic Security Labs
Elastic Security Labs@elasticseclabs·
Attackers in containers don't leave persistent artifacts. No files on disk. No post-incident logs. Just short-lived runtime behavior. Traditional detection approaches weren't built for this. Defend for Containers is. @RFGroenewoud published a deep-dive on how D4C captures runtime signals inside containerized Linux workloads, and how to build detection logic on top of it. The key things D4C gives you that you don't get elsewhere: - process.interactive flags hands-on-keyboard activity in production containers — rare and high-signal - Linux capability fields (effective + permitted) let you assess actual exploit potential, not just process names - Every event enriched with pod name, namespace, cluster, and privilege context - Policy wildcards let you scope detections to specific images, namespaces, or directory trees go.es.io/48sPCtC
Elastic Security Labs tweet media
English
0
10
37
2.6K
DefSecSentinel
DefSecSentinel@DefSecSentinel·
You are going to want to check out this awesome new research write-up from the team. Very interesting and somewhat creative initial access method. Includes a @macos piece as well. Shout out to @soolidsnakee, @SBousseaden and team working hard to get this out.
Elastic Security Labs@elasticseclabs

We have identified a novel social engineering campaign abusing Obsidian, the popular note taking app, to deliver a previously undocumented RAT #PHANTOMPULSE and it’s loader #PHANTOMPULL targeting individuals in finance and crypto. The attack never exploits a vulnerability. It abuses Obsidian's own plugin ecosystem to execute code the moment a victim opens a shared vault. Full analysis: go.es.io/4cld0dB

English
0
1
8
442
DefSecSentinel retweetledi
SolidSnake
SolidSnake@soolidsnakee·
New #research together with @SBousseaden and @DanielStepanic at @elasticseclabs. We uncovered a campaign abusing Obsidian plugins and vault feature to deliver multi-platform payloads targeting both #Windows and #macOS. The final stage is #PHANTOMPULSE, an AI-built RAT that resolves its #C2 from Ethereum blockchain transactions and its loader #PHANTOMPULL A deep dive into the RAT internals is coming next. Stay tuned. elastic.co/security-labs/…
English
1
14
48
7.6K
DefSecSentinel retweetledi
Elastic Security Labs
Elastic Security Labs@elasticseclabs·
We have identified a novel social engineering campaign abusing Obsidian, the popular note taking app, to deliver a previously undocumented RAT #PHANTOMPULSE and it’s loader #PHANTOMPULL targeting individuals in finance and crypto. The attack never exploits a vulnerability. It abuses Obsidian's own plugin ecosystem to execute code the moment a victim opens a shared vault. Full analysis: go.es.io/4cld0dB
English
3
42
118
14.1K
DefSecSentinel retweetledi
KL4R10N (Previously S4T4N)
Not every “old” GitHub repo is actually old. I break down DPRK-linked repo tradecraft abusing commit-date spoofing to fake legitimacy, while hiding obfuscated loaders in trusted config files. One sample had 100+ stars. Research: kl4r10n.tech/blog/when-git-… Thanks @pcaversaccio for recreating the spoofed commit and helping validate the technique.
KL4R10N (Previously S4T4N) tweet media
English
0
10
27
2.2K
DefSecSentinel retweetledi
DefSecSentinel retweetledi
DefSecSentinel retweetledi
Jamf Threat Labs
Jamf Threat Labs@JamfThreatLabs·
Hello World!
English
1
3
13
2.8K
DefSecSentinel retweetledi
Elastic Security Labs
Elastic Security Labs@elasticseclabs·
One of our researchers built an AI powered supply chain monitoring tool on a Friday afternoon. The following Monday night it caught the Axios npm compromise before most people knew it existed. Elastic Security Labs is open sourcing the tool. Full story by @dez_ here: go.es.io/4bOfsuq
English
4
18
88
16.8K
DefSecSentinel retweetledi
Samir
Samir@SBousseaden·
New blog post - prioritizing alerts triage with higher-order detection rules elastic.co/security-labs/…
English
0
17
66
5.8K