Andrew Pease

499 posts

Andrew Pease banner
Andrew Pease

Andrew Pease

@andythevariable

Elastic Security Labs Technical Lead. Lawful Neutral. Threat Hunting with the Elastic Stack author. Retired CW4.

Katılım Mayıs 2019
289 Takip Edilen1K Takipçiler
Sabitlenmiş Tweet
Andrew Pease
Andrew Pease@andythevariable·
It's not too often we get to work shoulder-to-shoulder with the practitioners and researchers on the front lines. #REF3927 is an intrusion set that deploys SEO cloaking capabilities, RATs, webshells, and RMMs - largely using a novel IIS module we named #TOLLBOOTH
Andrew Pease tweet media
Elastic Security Labs@elasticseclabs

#ElasticSecurityLabs joins forces with @tamusystem and discloses TOLLBOOTH, an IIS module used for SEO abuse that relies on publicly exposed ASP. NET machine keys: go.es.io/3L68p57

English
0
1
5
735
Andrew Pease retweetledi
Olivia Gallucci ✨
Olivia Gallucci ✨@OliviaGalluccii·
@IceSolst This is *exactly* what I am feeling. But, after I chatting with folks at [un]prompted, it felt like everyone is ahead of me. The only person I chatted with that was able to concretely describe implementation details was at Elastic, and had access to OS and AI logs.
English
2
2
17
1.1K
Andrew Pease retweetledi
SolidSnake
SolidSnake@soolidsnakee·
We are tracking #clickfix campaign hosted and served by two compromised websites. Lua in-memory script loader and a #RAT that we are naming #MimicRat. A blog post will follow soon on @elasticseclabs. www.ndibstersoft[.]com d15mawx0xveem1.cloudfront[.]net xMRi[.]neTwOrk
English
2
7
25
2K
Devon Kerr
Devon Kerr@_devonkerr_·
@0xTriboulet If you don’t let it on the Internet, any device can be dumb. I’m sure mine would love to run all manner of things, but it’s never had an IP address.
English
2
0
1
161
Andrew Pease retweetledi
vx-underground
vx-underground@vxunderground·
In regards to "cyber influencers", here is a list of people I think are actually great. However, I am extremely biased toward malware related content and/or low-level programming stuff. Unfortunately, some of the really technical people I like also do not post too often. They seem to appear out of thin air, release something spectacular, then disappear back into the ether. - @vx_herm1t, inspiration of vx-underground - @tmpout, linux malware stuff - @LloydLabs, malware researcher - @_ForrestOrr, malware researcher - @_winterknife_, low-level development - @splinter_code, security researcher - @decoder_it, security researcher - @gynvael, security researcher - @LukasStefanko, malware researcher - @bmmaloney97, DFIR researcher - @hasherezade, malware researcher - @SBousseaden, security researcher - @Intel80x86, low-level development - @0gtweet, security researcher - @push_pnx, malware researcher - @_xpn_, security researcher - @ItsGamerDoc, anti-cheat researcher - @herrcore, malware researcher - @CyberCakeX, Windows defense, hardening - @TwoSevenOneT, security researcher - @NTDEV_, low-level development - @daaximus, reverse engineering - @JRoosen, malware researcher - @PetrBenes, low-level development - @x86matthew, low-level development - @0xrepnz, low-level development I'm getting tired of listing people now. This is just a brief list. All of these people are exceptionally talented and have inspired me in my personal research. There are a lot more who are also super talented and do great things.
English
66
144
1.4K
92.6K
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
"dsstorebackup" seen from Taiwan: eab38fff15b885790083ba4d4e27f51f8a6a50fdd0be204569d71704818e3f07 Only 2 AV detections on VT, but both are suggesting this is a sample of some North Korean actors... Maybe @L0Psec @patrickwardle @moonlock_lab @txhaflaire or any other Mac expert will look into this shit and tell if it's anything interesting... 🤷‍♂️
MalwareHunterTeam tweet media
English
4
5
24
5.2K
Andrew Pease
Andrew Pease@andythevariable·
Excited to publish this in a few days…
Devon Kerr@_devonkerr_

@elasticseclabs is currently researching a new family of IIS malware impacting a large number of organizations globally. With a US university-based MDR provider, we’ve observed a novel attack chain, RMMs, a Godzilla-forked framework, and a malicious driver. Details coming soon.

English
0
0
1
156
Andrew Pease
Andrew Pease@andythevariable·
@SBousseaden This is how open source research is supposed to work. Responsible disclosure coupled with solid defense research. Rising tides, raises all ships. #teamwork
English
0
0
4
188
Samir
Samir@SBousseaden·
nice research & high likely this will be abused ITW, new detections out using new term rule type to alert on first time seen SubjectUserName in last 10 days creating a new dMSA account or modifying the msDS-ManagedAccountPrecededByLink attribute. github.com/elastic/detect…
Samir tweet media
Yuval Gordon@YuG0rd

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…

English
1
36
111
16.9K
Andrew Pease
Andrew Pease@andythevariable·
As defenders it’s always interesting to see how TAs view the landscape vs. the commercial checkboxes. Iron sharpens iron, good red teams make good blue teams.
English
0
0
3
280
Andrew Pease retweetledi
Samir
Samir@SBousseaden·
some detection/hunt rules to get started for SAP vuln CVE-2025-31324 : - JSP/JAVA/Class creation in the SAP IRJ dir. - Suspicious child processes indicating execution. github.com/elastic/detect…
Samir tweet mediaSamir tweet media
English
0
21
59
6.4K
Andrew Pease retweetledi
Elastic Security Labs
Elastic Security Labs@elasticseclabs·
Huh? That’s weird… what is that? It kind of looks like it’s a… new #cybersecurity report? 🤔 We’re excited about this one. Look out for more this week.
Elastic Security Labs tweet media
English
0
5
18
1.8K
Andrew Pease
Andrew Pease@andythevariable·
Sometimes naming intrusions and families can be tough - but sometimes TAs do all the hard work. Sorry Shelby's, but @soolidsnakee and @bluish_red_ had to put you to the canvas. #shelbyc2 #shelbyloader #ref8685
Andrew Pease tweet media
Elastic Security Labs@elasticseclabs

We’re exposing a newly discovered #malware family that has made its home on #GitHub. SHELBY targeted a middle east telecom company, uses GH commits for C2, and shares hard-coded tokens for authentication. Read the malware and campaign breakdown: go.es.io/3DXE8Cv

English
0
0
6
311
Andrew Pease retweetledi
Virus Bulletin
Virus Bulletin@virusbtn·
Elastic Security Labs researchers look into the REF7707 campaign targeting the foreign ministry of a South American country. The intrusion set utilized by REF7707 includes novel malware families such as FINALDRAFT, GUIDLOADER and PATHLOADER. elastic.co/security-labs/…
Virus Bulletin tweet media
English
0
9
28
2.3K