Wojciech Cieślak

29 posts

Wojciech Cieślak

Wojciech Cieślak

@bodziurity

Opinions are my own.

Katılım Nisan 2021
48 Takip Edilen57 Takipçiler
Wojciech Cieślak
Wojciech Cieślak@bodziurity·
@frycos Thanks for reaching out! My theory was that from the managment server you can somehow push binaries to the clients. The timing of the scans seemed to me like it was unlikely a coincidence 🤔
English
1
0
0
63
frycos
frycos@frycos·
@bodziurity My CVE describes overwriting a service binary on the 3CX Management server. Crowdstrike seems to speak about the Desktop client binary. Reads more like a leaked/compromised certificate than a server compromise via CVE-2022-28005. 🤔
English
2
0
1
396
Wojciech Cieślak
Wojciech Cieślak@bodziurity·
@Nopninja GET request to the path /Electron/download/windows/<REDACTED> The redacted part is a WIndows path to a file with a plaintext credentials.
English
1
0
0
63
watowat
watowat@Nopninja·
@bodziurity Can you elaborate on what exactly did you capture on honeypots?
English
1
0
0
60
John Hammond
John Hammond@_JohnHammond·
alright who here works at 3CX
English
16
9
107
53.2K
Wojciech Cieślak
Wojciech Cieślak@bodziurity·
CVE description kinda match Crowdstrike's observation. Not sure about the signed binary part though.
Wojciech Cieślak tweet mediaWojciech Cieślak tweet media
English
1
0
0
838
Wojciech Cieślak
Wojciech Cieślak@bodziurity·
We've seen mass scanning activity on the honeypots from 197[.]248[.]10[.]44 around March 23-25.
English
2
2
0
897
Kimberly
Kimberly@StopMalvertisin·
Today several documents have been uploaded to VT linking to a remote template hosted at https://msys[.]su Example: 2022-98772991.docx 0268a554079cd45e5b0b5b424637e6e4
Kimberly tweet mediaKimberly tweet mediaKimberly tweet media
English
2
10
23
7.5K
Wojciech Cieślak
Wojciech Cieślak@bodziurity·
@reybango @ShitSecure Sorry, it is missing in the blog. It is done in the standard way, the template is linked in the /word/_rels/settings.xml.rels
Wojciech Cieślak tweet media
English
1
0
1
135
Rey Bango 🇺🇦🌻
Rey Bango 🇺🇦🌻@reybango·
When @ShitSecure's UAC bypass is highly effective. The one thing I couldn't figure out was how the remote template was downloaded and loaded into the Word doc. I may have missed it in the explanation despite reading the post twice. Thoughts? trustwave.com/en-us/resource…
English
2
1
6
1.7K
Wojciech Cieślak
Wojciech Cieślak@bodziurity·
Fun #Follina (and not only) fact, you can add whatever after the '!' and exploit still works 🙃
Wojciech Cieślak tweet media
English
0
0
0
0
vx-underground
vx-underground@vxunderground·
March 8th, 2022 @TrendMicro released a paper on a new ransomware variant which exclusively targets Russian entities - the ransomware itself appropriately called RURansom. You can download the RURansom paper and samples here: cutt.ly/5ADsyua
vx-underground tweet media
English
3
42
118
0
Wojciech Cieślak retweetledi
Vitali Kremez
Vitali Kremez@VK_Intel·
One more down: 👇"bentley aka "Max Galochkin" aka "volhvb" aka Conti ransomware group technical lead - his unique alias "volhvb" logged into RaidCall via his own YouTube video youtube.com/watch?v=K2OmGB… ➡️into alias "volhvb" in Conti chats
YouTube video
YouTube
Vitali Kremez tweet mediaVitali Kremez tweet media
English
1
14
51
0
Ankit Anubhav
Ankit Anubhav@ankit_anubhav·
Finally not a macro malware! Likely #socgholish drive by download (fake Chrome update) leading to zip > js . Code is hosted on travelbans & live as of now. /travelbans.org/wp-content/cache/autoptimize/js/autoptimize_4c89b7b4ca9f0467b009d08390379f2d.js bazaar.abuse.ch/sample/6cc9f3b…
Ankit Anubhav tweet media
English
8
22
84
0
Wojciech Cieślak retweetledi
The DFIR Report
The DFIR Report@TheDFIRReport·
Cobalt Strike, a Defender's Guide - Part 2 ➡️In this report we talk about domain fronting, SOCKS proxy, C2 traffic, Sigma rules, JARM, JA3/S, RITA & more. Big shout-out to @Kostastsale for helping put this together! thedfirreport.com/2022/01/24/cob…
The DFIR Report tweet mediaThe DFIR Report tweet mediaThe DFIR Report tweet mediaThe DFIR Report tweet media
English
6
347
757
0
Wojciech Cieślak retweetledi
Wojciech Lesicki
Wojciech Lesicki@WLesicki·
Interesting report about #cobaltstrike . We have here both what techniques are used by threat actors, but also how to emulate them. And, of course, detect. I’m very pleased that the @sigma rule created by @cyb3rops and me was mentioned.
Wojciech Lesicki tweet media
Recorded Future@RecordedFuture

Cobalt Strike was created with the best of intentions, but it has quickly gained traction with threat actors who use it for nefarious reasons. Learn more about how to detect Cobalt Strike in this deep-dive: bit.ly/3CpzmHF

English
2
24
54
0
Wojciech Cieślak
Wojciech Cieślak@bodziurity·
Looks like there is new ITW CVE-2021-40444 sample. d793193c2d0c31bc23639725b097a6a0ffbe9f60a46eabfe0128e006f0492a08 hxxp://hr[.]dedyn[.]io/word[.]html hxxp://hr[.]dedyn[.]io/word[.]cab #CVE202140444
HT
1
1
0
0