ᴘᴀʀᴛʜɪ

1.4K posts

ᴘᴀʀᴛʜɪ

ᴘᴀʀᴛʜɪ

@cyber__sloth

Intelligence Analyst @Atlassian

United Kingdom Katılım Kasım 2009
404 Takip Edilen2.6K Takipçiler
ᴘᴀʀᴛʜɪ
ᴘᴀʀᴛʜɪ@cyber__sloth·
Recruitment #Phishing for well-known orgs like Google, Meta, YouTube Full list of IOCs is here pastebin.com/K8EezySa ytjobsunit[.]com ytjobspartner[.]com ytjobsmember[.]com metaworkrooms-hiring[.]com metaworkrooms-careers[.]com
ᴘᴀʀᴛʜɪ tweet mediaᴘᴀʀᴛʜɪ tweet media
English
0
0
0
775
ᴘᴀʀᴛʜɪ
ᴘᴀʀᴛʜɪ@cyber__sloth·
@Antonlovesdnb @HuntressLabs Love to have your thoughts on the macOS IR cases or Linux. How do they compare against Windows environments, how easy is it for TA's to laterally move, and what TTPs do you see in the wild?
English
0
0
0
74
Anton
Anton@Antonlovesdnb·
Coming up on my 1 year anniversary with @HuntressLabs ! Taking this opportunity to go over some things myself and the team have seen in intrusions and drop some tips on basic things you can do to make your network more immune to compromise. Let's start with initial access - We see so much VPN compromise, it's by far our number 1 initial access vector - yes 0days for VPN appliance are there, but most of the time the compromise is a result of good ol' fashion credential stuffing or brute force. - Some VPN appliances have decent log retention, others do not and it really sucks when only ~1 hour worth of logs are available - if you're standing up a SIEM or any kind of log collection effort in your org, make sure that devices which are externally exposed are sending their telemetry to the SIEM. If your VPN appliance has different logging settings, check them out and enable as needed - this telemetry is gold during intrusions. - In addition to VPN appliances, we see a lot of RDP / RDS machines get compromised - same story here, no fancy 0days, just weak credentials in use. In some cases, MFA is in use, but has either been bypassed for the compromised user or has "failed open" - if you use RDP for your org, make sure that MFA is enabled somehow on it, if it is enabled, test to see what happens when the process that handles MFA crashes or is turned off. Also, make sure you have good procedures in place for turning MFA bypasses back off when they're applied. - Remember to keep an eye on your web applications, deserialization attacks aren't super common, but happen fairly often. Turn on IIS logging and enable POST request logging if possible. Remember that a standard penetration test often does not deep dive into custom web applications, invest in a good Appsec focused test if you have a custom application exposed externally. Turning to lateral movement - Once inside networks, threat actors move very quickly and unfortunately do not run into a lot of resistance. We typically see multiple accounts compromised in rapid succession, suggesting weak or shared passwords in use. You have no idea how happy it makes me to see "LOGON_TYPE_NOT_GRANTED" in the logs - Yes I know segmenting your network is probably a pain, but its a very effective security control. - In most cases we see, RDP is used for lateral movement and unfortunately, there is often no controls to prevent users from RDP'ing into servers they have no business need to RDP into. Check your Active Directory permissions and see what users can RDP into your file servers and domain controllers, you might be very surprised by what you find! - Impacket & impacket-related tooling is very popular for lateral movement, if you are in charge of defending a network and have telemetry and a lab environment, try to use WMIExec etc for yourself and compare the telemetry you see versus normal activity, this is a great way to build high-fidelity alerts. Aside from that, remove local admin where possible. Local admin rights enable credential access and lateral movement avenues that would be shut right down were a non-admin account in use. Looking at Execution / Impact - Do threat actors use fancy 0days ? Yes of course, but in the cases we work, we rarely see it. Most of the time, "just enough tradecraft" is employed, all a TA needs is FileZilla and 7Zip to ruin your day. - Tunneling tools like ngrok and plink are very popular, most often, these tools are being used to make RDP externally available to the TA - everyone loves a GUI I guess. How do adversaries get credentials ? - Registry credential dumping is extremely popular, same with LSASS credential dumping. Threat actors will also search local file systems and network shares for credentials and - guaranteed - will find them. By segmenting your network, limiting local admin access and hardening authentication silos within your AD environment ( things like a three-tiered admin model, or as close to it as you can get ) will limit the impact of credential theft drastically. - Brute forcing is old and boring I get it, but unfortunately it works, especially for less-monitored environments, some cases we've seen hundreds of thousands brute force attempts for hours before an account is successfully compromised. Don't sleep on brute forcing, ensure you have account lock out policies in place and some kind of monitoring for brute force attacks. Miscellaneous tidbits - Please, please, please - change your default Windows log sizes via GPO. By default, these log channels do not hold a lot of data, if a threat actor undertakes a brute force in the environment, security-relevant telemetry will be clobbered hampering any investigation efforts. - Have a standard naming convention for your organizations' workstations and servers, this makes it so much easier to orientate everything during an investigation and very often bubbles up malicious activity for workstations that don't fit the standard naming convention. - Have a plan in place in case of an incident, it's bound to happen and it's better to be prepared. What happens if certain hosts need to be offline, who do you call to get a potential insurance claim started? What is the threshold for a formal IR engagement - deciding all these things under pressure from an incident is not ideal. I think this post is long enough 😅 so I'll wrap it up 💙
English
15
47
216
29.1K
Paul Goffar
Paul Goffar@n3tl0kr·
@AccidentalCISO Actually, I use Zohomail too, forgot. Free up to 5 users, easy admin portal and no charge to map your MX records
English
4
1
26
2.9K
Accidental CISO
Accidental CISO@AccidentalCISO·
I have a family member that wants a custom email domain for personal use (multiple users likely). What services are good for this without going all the way to M365 or Google Workspace? They are going to need easy to manage.
English
168
7
231
66.9K
ᴘᴀʀᴛʜɪ
ᴘᴀʀᴛʜɪ@cyber__sloth·
@cyb3rops Please try chrome to detect password reuse. This has been super helpful for us. You can also enforce password reset if there’s password reuse.
English
0
1
1
214
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
How do you prevent a corporate user from choosing the same password for a business service that he uses for some private accounts? How do you prevent a password sync from his corporate browser to his private one? How do you prevent browser extensions from leaking corporate credentials? I'm sure your org has answered these questions already.
English
69
44
336
62.8K
ᴘᴀʀᴛʜɪ retweetledi
Will Harris
Will Harris@parityzero·
With Chrome 127 on Windows, we're introducing enhanced encryption to protect sensitive data, starting with your cookies🍪! This helps protect your personal information and keeps your online accounts secure from hackers. Read more about this protection: security.googleblog.com/2024/07/improv…
Will Harris tweet media
English
12
130
341
98.8K
Matthew
Matthew@embee_research·
[7/] I wanted a high level view of the 2500+ results, so I utilised the export feature and brought in #CyberChef. Sorting by alphabetical order made the data much easier to digest. This revealed that the brands most commonly impersonated had a mail subdomain.
Matthew tweet mediaMatthew tweet media
English
2
0
6
999
Matthew
Matthew@embee_research·
Uncovering 169 Phishing Domains With DNS Pivoting 🔥 Leveraging my new favourite DNS tool to pivot from an initial IOC to 169 domains impersonating popular fashion brands. [1/14] 🧵 #phishing #threatintel #malware
Matthew tweet mediaMatthew tweet mediaMatthew tweet mediaMatthew tweet media
English
4
84
281
34K
ᴘᴀʀᴛʜɪ retweetledi
Ginkgo
Ginkgo@ginkgo_g·
#APT #Sidewinder e2a3edc708016316477228de885f0c39 The decoy document is information about the itinerary of #Nepali Prime Minister Pushpa Kamal Dahal. After the macro code is run, multiple VBScript files, batch files, and ZIP files containing the #Nim backdoor will be released.
Ginkgo tweet mediaGinkgo tweet mediaGinkgo tweet media
English
4
13
31
7.4K
Pepperfry.com
Pepperfry.com@Pepperfry·
@cyber__sloth Dear Parthi, We are sorry to hear about your concern. Please allow us some time to check and get back to you on this.
English
1
0
0
69
ᴘᴀʀᴛʜɪ
ᴘᴀʀᴛʜɪ@cyber__sloth·
@Pepperfry please help me with the order 309211269. I’ve been trying to reach out to the support via email, but no response.
English
1
0
0
41