Daniel Lunghi

246 posts

Daniel Lunghi

Daniel Lunghi

@thehellu

Threat researcher @TrendMicroRSRCH mostly focused on #APT

เข้าร่วม Şubat 2011
595 กำลังติดตาม2.1K ผู้ติดตาม
ทวีตที่ปักหมุด
Daniel Lunghi
Daniel Lunghi@thehellu·
We saw Earth Estries, an advanced #APT group, sharing its access to Earth Naga (Flax Typhoon). We introduce the term "Premier Pass" to describe this behavior, and propose a four-tier classification framework for collaboration types among advanced groups trendmicro.com/en_us/research…
Daniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet media
English
0
2
8
721
Daniel Lunghi
Daniel Lunghi@thehellu·
We investigated an #APT with links to Void Rabisu that used Trend Micro updates as a lure in a recent campaign involving vulnerability exploitation. There were at least 4 stages before the final payload, some of them being tailored to the targeted machine trendmicro.com/en_us/research…
Daniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet media
English
0
4
20
9.2K
Daniel Lunghi
Daniel Lunghi@thehellu·
Orange Cyberdefense saw the same threat and named the ransomware "NailaoLocker". orangecyberdefense.com/global/blog/ce…. They share interesting thoughts on the motivations of the ransomware deployment, although they don't have the final answer. We also saw no financial gain for the threat actor
Daniel Lunghi tweet media
English
0
2
8
599
Daniel Lunghi
Daniel Lunghi@thehellu·
For incident responders out there, remember to retrieve the volume serial number where #Shadowpad was deployed, since it is used to encrypt the payload in the registry. Those serial numbers can also be found in LNK and prefetch files in case you don't have live access to the host
Daniel Lunghi tweet mediaDaniel Lunghi tweet media
English
1
3
8
601
Daniel Lunghi
Daniel Lunghi@thehellu·
We released a report on a threat actor using an updated version of #Shadowpad including anti-debugging features, that in some cases deploy a custom ransomware family. We have mainly seen the manufacturing industry being targeted in Europe and Asia trendmicro.com/fr_fr/research… #APT
English
1
14
42
3.3K
Daniel Lunghi รีทวีตแล้ว
Mandiant (part of Google Cloud)
Ever wonder how attackers use advanced tools to evade detection? Mandiant analyzes #ScatterBrain, an obfuscator in the POISONPLUG.SHADOW backdoor, which is used by China-nexus actors. Learn how we’re unmasking these sophisticated threats. Read more: bit.ly/42xfceL
Mandiant (part of Google Cloud) tweet media
English
0
36
77
7.3K
Daniel Lunghi
Daniel Lunghi@thehellu·
Our latest report presents Earth Minotaur, a threat actor targeting Tibetans and Uyghurs using Moonshine, an exploitation framework for Android described in 2019 by @citizenlab leveraging vulnerabilities in applications embedding old versions of Chrome trendmicro.com/en_us/research…
Daniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet media
English
0
19
31
3.3K
Daniel Lunghi รีทวีตแล้ว
Jl_N_
Jl_N_@Jl_N_·
Nous recrutons dans notre équipe. Si vous avez des compétences en RE, souhaitez travailler au profit de la Gendarmerie en tant qu'expert judiciaire et manager une équipe de passionnés : …stereinterieur-career.talent-soft.com/Pages/Offre/de… (rt apprécié)
Français
0
11
5
1.4K
Daniel Lunghi
Daniel Lunghi@thehellu·
Excellent malware analysis from Checkpoint that describes the Linux version of Xdealer/DinodasRAT that we listed but did not described in our Earth Krahang #APT report research.checkpoint.com/2024/29676/ Kudos for referencing all the related reports 👏
English
0
8
32
2.6K
Daniel Lunghi รีทวีตแล้ว
Mark Kelly
Mark Kelly@markkelly0x·
It’s been a minute since the last i-SOON blog 🇨🇳@RecordedFuture is releasing further research exploring infrastructure, tooling, victimology, and personnel overlap between I-SOON & multiple Chinese state-sponsored groups: RedAlpha, RedHotel, & POISON CARP recordedfuture.com/attributing-i-…
English
1
32
80
9.3K
Daniel Lunghi
Daniel Lunghi@thehellu·
Their favorite malware toolkit are Reshell, a basic .NET backdoor, and Xdealer, also named Dinodas RAT, two custom malwares. They also use the infamous #CobaltStrike, #PlugX and #Shadowpad. Many of their offensive and post-exploitation tools are retrieved from public sources.
Daniel Lunghi tweet mediaDaniel Lunghi tweet media
English
0
1
2
732
Daniel Lunghi
Daniel Lunghi@thehellu·
Targets are spread among 5 continents, although some countries are targeted more heavily: one country had 11 of its government entities compromised. Previous victims are used to compromise new ones by abusing their infrastructure to send spear-phishing emails or host malware
Daniel Lunghi tweet media
English
1
0
2
730
Daniel Lunghi
Daniel Lunghi@thehellu·
Our latest report on a CN #APT targeting tens of governments entities worldwide has been published 🥳 After monitoring it for a long time we realized it is likely related to the recent I-Soon company leaks. It discusses their TTPs and provides lots of IOCs trendmicro.com/en_us/research…
Daniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet media
English
1
47
112
14.5K
Daniel Lunghi
Daniel Lunghi@thehellu·
@hassnain782 Thanks for the interest. As I said in the introduction, we first found the Shadowpad DLL, and then, we could find it was embedded in a CAB file, itself embedded in an MSI file. You can see those links in Virus Total in the "Relations" tab (probably requires enterprise account)
Daniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet media
English
0
0
0
107
Cyberfox
Cyberfox@hassnain782·
@thehellu Bro i have been following to get more details about your hypothesis about this article you wrote in 2022. Loved the explainaton !! But one question still remains How you was able to get access of mailious e-office version
English
1
0
0
53
Daniel Lunghi
Daniel Lunghi@thehellu·
VB released my talk on a #Shadowpad sample delivered by a Pakistan gov application. It contains an analysis of the modified MSI installer, some tricks to pivot on old and new Shadowpad samples, an overview of the #APT campaign, and attribution discussion youtube.com/watch?v=i52MH-…
YouTube video
YouTube
English
2
23
54
7.8K
Daniel Lunghi
Daniel Lunghi@thehellu·
@ItsNavdeep You are 100% correct ! The same applies to DeedRAT then. DE DE 43 D0 is the OpenDNS resolver in reverse order (looks like they messed up), and the others are Google, Cloudflare and Quad9 resolvers. I didn't know 4.4.4.4 and 4.2.2.2. Big thanks for pointing this out !
Daniel Lunghi tweet media
English
0
0
1
115
Navdeep
Navdeep@ItsNavdeep·
@thehellu Great analysis! Would like to just point out one minor oversight in the report: The bytes 08 08 08… are not a hard-coded delimiter. They are instead the 4 DNS lookup IP addresses used to resolve C2 domains: 8.8.8.8 8.8.4.4 4.4.4.4 4.2.2.2
Navdeep tweet media
English
1
0
2
220
Daniel Lunghi
Daniel Lunghi@thehellu·
@_lostpacket_ No, version 2.0.3 of the legitimate MSI installer (the one backdoored by the threat actor) was uploaded to VT the day after we published our report. We know of a PK gov entity that published it between April and June 2023, but the incident happened long before, on September 2022.
English
0
0
0
41
Daniel Lunghi
Daniel Lunghi@thehellu·
We found a probable supply chain attack on eOffice application developed by Pakistan government. It delivers #Shadowpad with an updated obfuscation and encryption scheme. The threat actor carefully chose the C&C to blend in legitimate network traffic trendmicro.com/en_us/research… #APT
Daniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet media
English
3
49
100
46.6K
Daniel Lunghi
Daniel Lunghi@thehellu·
@keydet89 @r00tbsd I believe looking at your list of publications would answer that question :) in case of doubt, it was intended as a compliment. I was a happy RegRipper user few years ago
English
0
0
0
53