Ned Moran

1.6K posts

Ned Moran

Ned Moran

@moranned

Professor. Consultant. Analyst. Technologist. Security Geek. Privacy Advocate. Runner. Couch Potato.

Washington, DC Katılım Mayıs 2007
401 Takip Edilen1.6K Takipçiler
billy leonard
billy leonard@billyleonard·
PDBs to hunt for: E:\Working\Projects\EmailDownloader\EmailDownloaderCookieMode\EmailDownloader\obj\Debug\EmailDownloader.pdb E:\Working\Projects\EmailDownloader\EmailDownloaderCookieMode\Mahdi\LiveLib\obj\Release\LiveLib.pdb @12thMan 🏈 fans? 🔮 says another 8-4 season
English
2
0
4
0
Ned Moran
Ned Moran@moranned·
@ChicagoCyber also important to note that Muddy as a unitary actor != Muddy as a supporting org that enables other ops. This is an easy thing to miss.
English
1
0
3
0
Ned Moran
Ned Moran@moranned·
@ChicagoCyber this is correct. from my view, there were multiple actors in at least one of the thanos victims so difficult to pin it solely on Muddy.
English
1
0
1
0
Ned Moran
Ned Moran@moranned·
@ChicagoCyber Otrio! Cant wait for my kids to be old enough to play this
English
0
0
0
0
Ned Moran
Ned Moran@moranned·
@Dragonkin37 @BojackTrojan @OhadMZ @Dragonkin37 is correct. At Cyberwarcon I noted that the only links between 33 and DEADWOOD were timing and targeting - which in and of themselves are low-confidence. We track DEADWOOD separately from 33.
English
0
4
6
0
JP Castellanos
JP Castellanos@Dragonkin37·
@BojackTrojan @OhadMZ @moranned Interesting I do recall that breif (great work by ned btw), but again I dont believe there was firm or high confidence attribution its them, I think it was more along the lines of APT33 does destructive attacks but we lack the evidence if this activity is tied to them.
English
1
0
3
0
JP Castellanos
JP Castellanos@Dragonkin37·
Shamoon = APT33 ZeroCleare = APT34 Dustman = ????? Deadwood = ???? Can agree Iranian nexus but there has NO been positive confirmation DEADWOOD was shared between APT33 and APT34.
English
1
1
4
0
Christopher Glyer
Christopher Glyer@cglyer·
Details of implant at SolarWinds responsible for inserting malicious code It “finds Orion solution file path in MsBuild.exe process, it replaces a source code file in solution directory, w/malicious variant to inject SUNBURST while Orion is being built” crowdstrike.com/blog/sunspot-m…
English
1
39
99
0
Ned Moran retweetledi
Saher Naumaan
Saher Naumaan@saffronsec·
While MuddyWater's link to ransomware remains tenuous and unproven, the group is heavily invested in custom tool development. From PowerShell to .NET to C++ malware, Muddy is fast approaching other groups' capabilities. @snlyngaas reports w/ lines from me cyberscoop.com/muddywater-ira…
English
0
9
19
0
Ned Moran retweetledi
bk (Ben Koehl)
bk (Ben Koehl)@bkMSFT·
It's almost as if there are companies providing/selling capabilities whether its Implants, Exploits, or all of the above and what you may see here are downstream customers. @moranned and I covered this a little bit in shadowserver.org/news/the-itali… from 2015.
Daniel Lunghi@thehellu

It turns out the RCSession family described by Secureworks is the same as the "Type 2" malware family that we described in our report documents.trendmicro.com/assets/white_p… So either RCSession/Type 2 malware family is shared among multiple threat actors, or #DRBControl is part of #MustangPanda

English
1
9
27
0
Ned Moran retweetledi
bk (Ben Koehl)
bk (Ben Koehl)@bkMSFT·
There are a number of these kinds of examples where this kind of sharing can be inferred too in the infrastructure side of things, but.. this is Twitter and they probably also read the same tweets the defenders do.
English
0
2
3
0
Ned Moran retweetledi
Оlga Belogolova 🌻
Оlga Belogolova 🌻@olgs7·
Thanks for your patience, class! Took a little hiatus for a month. But we're back! In week 5 of “Lies & Disinformation” @Georgetown, we pivoted from Russian influence activities to Chinese and Iranian IO state actors.
Оlga Belogolova 🌻@olgs7

I’ve been meaning to do this for some time: starting this week, I will be sharing my syllabus and recommended readings from the “Lies, Damned Lies, and Disinformation” course I taught in the spring semester @Georgetown SSP. I’ll be sharing some highlights from each week’s lesson.

English
3
7
46
0
Ned Moran
Ned Moran@moranned·
@9bplus @Mao_Ware @TheCollierJam Im still traumatized by years of 2k erg tests in college, but I will throw down on intervals (500m w/ 1min rest * 8) or a straight 5k.
English
0
0
1
0
Ned Moran
Ned Moran@moranned·
@RidT @BuchananBen i think its important that you measure effects across intrusion sets - even those that arent targeted via doxxing, indictments, etc. others can watch and learn and not repeat the mistakes their peers may have made.
English
0
1
10
0