Reid H.

81 posts

Reid H. banner
Reid H.

Reid H.

@Reid0nly

Tier 3 SOC @AWNetworks | senior merch collector

Florida, USA Katılım Şubat 2023
344 Takip Edilen113 Takipçiler
Reid H. retweetledi
vx-underground
vx-underground@vxunderground·
Something nerds don't want to admit: they low-key enjoy the chaos Yeah, yeah, ransomware is bad, state sponsored threat actors are bad, but deep down when shit hits the fan it is exciting. Even though it's just a beep boop computer your adrenaline gets pumping
English
49
71
1.1K
33K
Reid H.
Reid H.@Reid0nly·
@dez_ Amazing work. Just sent this over a few of our affected clients.
English
0
0
2
538
Reid H.
Reid H.@Reid0nly·
@UK_Daniel_Card CISA forgot to include personal VPNs make your MDR analysts angry when they have to review Entra logs :)
English
0
0
3
523
mRr3b00t
mRr3b00t@UK_Daniel_Card·
Cyber Tweeps, check this out: From CISA, Mobile Communications Best Practice Guidance 'Do not use a personal virtual private network (VPN). Personal VPNs simply shift residual risks from the internet service provider (ISP) to the VPN provider, often increasing the attack surface. Many free and commercial VPN providers have questionable security and privacy policies. However, if your organization requires a VPN client to access its data, that is a different use case.' cisa.gov/sites/default/…
mRr3b00t tweet media
English
15
21
137
14.4K
Reid H. retweetledi
Aura
Aura@SecurityAura·
Whenever I have clients that talk about DLP to prevent exfil and so on I ask them to do one test: Go on a random server, download the portable version of WinSCP or FileZilla, connect to an outbound SFTP or FTP server and transfer files. Neither DLP or EDR will do anything here
Steve Borosh@rvrsh3ll

@T3chFalcon Can say that DLP has not once prevented me from exfiltrating data from a network.

English
20
22
175
26.4K
Reid H.
Reid H.@Reid0nly·
Responded to a Teams phishing attack and identified the threat actors were storing victim’s creds in clear text on their fake support portal. Poked around some and saw one of the victim’s works at Fortinet. Looks like they don’t block Teams chats from external domains 🤣
Reid H. tweet media
English
0
1
4
377
Reid H.
Reid H.@Reid0nly·
@wbmmfq You guys see any Clickfix payloads drop VirtualBox? Saw two cases today and confused the hell out of me.
English
1
0
1
126
Tanner
Tanner@wbmmfq·
A fun new-ish #Clickfix payload has been using Node.js to deploy a local SOCKS proxy, then connecting to Tor over that to download a secondary payload. Maybe I'll do a bit more of a writeup of it later. We'll see how the day goes.
English
4
4
46
3.2K
Steven Lim
Steven Lim@0x534c·
Fresh *CLICKFIX* coffee brewing 😂 This one just showed up on my radar, defender you know what to do with it 🤭 coffeemaxusa[.]com #cybersecurity #clickfix #defender
Steven Lim tweet media
English
5
14
48
5K
Reid H.
Reid H.@Reid0nly·
@sudo_Rem @HuntressLabs Thanks for the write up. Had a ton of ADNotificationManager infections last week and was curious what the malware was/did.
English
0
0
2
66
Rem
Rem@sudo_Rem·
🧑‍💼"Your Outlook has an issue. Let me help you fix it." @HuntressLabs Threat Hunting and Tactical Response teams join forces to open new pages on an old playbook, leading to custom Havoc agent deployment via sophisticated DLL side-loading. huntress.com/blog/fake-tech…
English
4
15
63
18.3K
Tara Palmeri
Tara Palmeri@tarapalmeri·
Michael Tracey, who calls himself a journalist, has been smearing Jeffrey Epstein survivors — and sometimes me. I can take it. But I asked him one simple question: Are you being paid by someone powerful to attack sex-crime victims? Yes or no. His audio mysteriously died. Weird. @PiersUncensored
English
871
3.3K
14.6K
773.2K
Rem
Rem@sudo_Rem·
🚨Widespread SonicWall SSLVPN Compromise @HuntressLabs has observed a significant uptick in SonicWall SSLVPN intrusions stemming from DigitalOcean, LLC ASNs. This intrusion activity has resulted in 83 compromised SSLVPN accounts over 3 days, both local and LDAP-backed. Source IPs - 192.241.185[.]61 - 159.223.171[.]114 - 138.68.9[.]204 Details - Many authentications were 'replayed' several hours later on some devices from the same source IP addresses. - Multiple SonicWall SSLVPNs showed evidence of 10+ users compromised from the same source IP address. - Authentications where multiple user accounts were compromised were performed alphabetically, with intermittent failures. - Authentications were performed in short "bursts", where multiple user accounts were authenticated in the same 60 second period. - Authentications rarely failed for users who were compromised-- that is, accounts maliciously accessed did not display characteristics of bruteforcing. - This may suggest adversaries possess a valid username/password combination list, and are validating credentials automatically.
English
2
7
21
2.7K
Reid H. retweetledi
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft Defender researchers observed attackers using yet another evasion approach to the ClickFix technique: Asking targets to run a command that executes a custom DNS lookup and parses the `Name:` response to receive the next-stage payload for execution.
Microsoft Threat Intelligence tweet media
English
21
239
985
165.6K
Reid H.
Reid H.@Reid0nly·
@RonnyTNL @craiu Our SOC takes a shot every time a new firewall vuln gets exploited
English
0
0
1
20
Ronny
Ronny@RonnyTNL·
@craiu This is becoming a water is wet meme by now...
English
1
0
3
223
Reid H.
Reid H.@Reid0nly·
If you have a FortiGate, disable the FortiCloud SSO login feature. We have observed multiple compromises of fully patched Fortinet firewalls in the last 24 hours that exhibit behavior similar to a CVE disclosed last December. fortiguard.com/psirt/FG-IR-25…
English
0
1
1
229
Reid H. retweetledi
Peter Girnus 🦅
Peter Girnus 🦅@gothburz·
Last week our CISO asked me to present on “zero trust architecture.” I don’t know what that means. I make $340,000 a year. I haven’t touched a firewall since Obama’s first term. But I have a CISSP. I passed by memorizing acronyms. I still don’t know what half of them stand for. I opened my presentation with “assume breach.” Everyone nodded gravely. I said “defense in depth” three times. The board was captivated. Then a junior analyst raised her hand. She asked how we’d implement microsegmentation. I felt a cold sweat. I said, “Great question. Let’s take that offline.” She persisted. I said we should “leverage AI-driven solutions.” She asked which ones. I said, “The cloud-native ones.” She looked confused. I told her confusion was natural. I said, “Security is a journey, not a destination.” The CEO started clapping. I don’t know why. But others joined in. The analyst stopped asking questions. I ended with “security is everyone’s responsibility.” This meant it was no one’s responsibility. Especially not mine. We got breached two weeks later. I blamed the analyst for “creating a culture of doubt.” She got put on a PIP. I got promoted to VP. Resilience isn’t about preventing failure. It’s about surviving it. Preferably while others don’t.
English
192
706
6.1K
464.9K
Reid H.
Reid H.@Reid0nly·
@malmoeb @hackerkartellet Thought that hostname looked familiar. Two of our clients got hit from the same device in September. 10/10 opsec Akira
English
0
0
0
1K
Stephan Berger
Stephan Berger@malmoeb·
Reading a report from a recent Incident Response case from my teammate, @hackerkartellet. "It was observed that an unknown hostname “DESKTOP-LDIG48N” from the VPN DHCP IP address 192.168.128.149 made multiple failed login attempts using the username “admin” against various hosts within the network." I keep repeating myself here, but developing a naming convention for computers and servers, and then start monitoring the DHCP requests for hostnames that are outside the naming conventions. Same thing for event logs: If you ingest and/or monitor Security/RDP logs, check for naming convention outliers, as in the example above. That might be a quick win for detecting an attacker in your network. On a side note, you might want to restrict access coming from your VPN LAN to your internal servers as well, to complicate and slow down lateral movements.
English
8
27
148
29.4K
Reid H. retweetledi
Ben
Ben@polygonben·
My first @HuntressLabs blog is live: we break down some funky ClickFix lures that lead to a loader which uses steganography to extract shellcode and ultimately deliver LummaC2/Rhadamanyths stealers. Big thanks to @RussianPanda9xx for the help! 😇 huntress.com/blog/clickfix-…
Ben tweet media
English
7
60
232
29.6K
Reid H.
Reid H.@Reid0nly·
@IceSolst @UK_Daniel_Card Are you including vendors who switched from sponsoring the best performing F1 team to the worst? Asking for a friend.
Reid H. tweet mediaReid H. tweet media
English
0
0
1
33