Samir(@SBousseaden) 's Twitter Profileg
Samir

@SBousseaden

Detection Engineering | Elastic Security

Mastodon: @[email protected]

ID:1112645486

calendar_today22-01-2013 21:08:28

2,6K Tweets

23,7K Followers

1,1K Following

Elastic Security Labs(@elasticseclabs) 's Twitter Profile Photo

Interested in securing the lifecycle of your LLM? The newest article from Mika Ayenson details his research into native protections against the OWASP® Foundation Top Ten with ES|QL. Check it out: go.es.io/3Qht7i9

account_circle
Elastic Security Labs(@elasticseclabs) 's Twitter Profile Photo

In the first of three, Cyril F. gives an overview of the implant’s major capabilities. Tune in next week to gain new insights, learn detection strategies from @sbousseaden, and more! Read part 1 here: go.es.io/4aZrtcX

account_circle
Elastic Security Labs(@elasticseclabs) 's Twitter Profile Photo

.Samir‘s new article explores recent Windows zero-day attacks by analyzing in-the-wild LPE examples and outlining detections that can be run in Elastic Security. Check out the three cases: CLFS, DWM, and Activation Context: go.es.io/43vV8rC

account_circle
Samir(@SBousseaden) 's Twitter Profile Photo

New blog post is up, unveiling malware behavior trends (TTPs) from a dataset of more than 100K malware samples using Elastic behavior detections (mapped to MITRE) and ES|QL for the analysis.

elastic.co/security-labs/…

samples gist.github.com/Samirbous/eebe…

New blog post is up, unveiling malware behavior trends (TTPs) from a dataset of more than 100K malware samples using Elastic behavior detections (mapped to MITRE) and ES|QL for the analysis. elastic.co/security-labs/… samples gist.github.com/Samirbous/eebe…
account_circle
Elastic Security Labs(@elasticseclabs) 's Twitter Profile Photo

Our new article from Samir explores a dataset of 100,000 malicious files that we gathered from Detonate. Check out the behavior breakdown: go.es.io/3TqmdIn

Analysis

account_circle
Samir(@SBousseaden) 's Twitter Profile Photo

I love when memory yara signature get combined with behavior detection (confirms suspicion + save time for tool identification) e.g. for SharpRDP signature + Suspicious RDP Client behavior triggering on same process 😍

github.com/elastic/protec…

github.com/elastic/protec…

I love when memory yara signature get combined with behavior detection (confirms suspicion + save time for tool identification) e.g. for SharpRDP signature + Suspicious RDP Client behavior triggering on same process 😍 github.com/elastic/protec… github.com/elastic/protec…
account_circle
Elastic Security Labs(@elasticseclabs) 's Twitter Profile Photo

researchers SolidSnake and Daniel Stepanic share new details about an emerging campaign using obfuscation to evade defenses and deploy a variety of malware payloads. Read more at elastic.co/security-labs/…

account_circle
Terrance DeJesus(@_xDeJesus) 's Twitter Profile Photo

Wrote a blog on monitoring Okta threats with Elastic Security. This is a step-by-step guide on getting started with a FREE trial. More to come on and very soon! Thanks for reading.

go.es.io/3V5ujZx

account_circle
Samir(@SBousseaden) 's Twitter Profile Photo

useful forensics artifacts for : .url file in the WebDav cache folder

C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\TfsStore\Tfs_DAV\*.url

useful forensics artifacts for #CVE_2024_21412 : .url file in the WebDav cache folder C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\TfsStore\Tfs_DAV\*.url
account_circle
Walied Assar(@waleedassar) 's Twitter Profile Photo

I am releasing my kernel fuzzer 'SimpleNTSyscallFuzzer' for public use. With the help of this generic fuzzer, i managed to have more than 15 CVEs. Enjoy!

github.com/waleedassar/Si…

account_circle
Samir(@SBousseaden) 's Twitter Profile Photo

likely testing sample/poc implementing TI ETW (vm read/write targeting lsass) bypass via NtSetInformationProcess (Win10-)

riskinsight-wavestone.com/en/2023/10/a-u…

9269e4e628e652daaadea0106c2427a64c3b3b15ed9fec46a35bed9720782d49

likely testing sample/poc implementing TI ETW (vm read/write targeting lsass) bypass via NtSetInformationProcess (Win10-) riskinsight-wavestone.com/en/2023/10/a-u… 9269e4e628e652daaadea0106c2427a64c3b3b15ed9fec46a35bed9720782d49
account_circle
John U(@jdu2600) 's Twitter Profile Photo

More APIs + more call stacks = more detection.

I've blogged about some of the tradeoffs necessary in providing visibility of highly verbose Windows APIs at EDR scale.

TL;DR - fingerprints to dedup, and let users opt-in to the full firehose.

elastic.co/security-labs/…

account_circle
Elastic Security Labs(@elasticseclabs) 's Twitter Profile Photo

In this follow up from his article in May, Samir digs deeper into call stacks! See how Elastic Security 8.11 further increases efficacy against in-memory threats: go.es.io/47vnlPZ

account_circle
Justin Ibarra(@br0k3ns0und) 's Twitter Profile Photo

Over the same period, on the SIEM side, we also increased the rule count by ~625 new rules to over 1300 rules.

Thats ~2k total rules across the 2 features! 🎉🎉

Looking forward to us enhancing coverage even more in 2024 🍻!

github.com/elastic/detect…

Over the same period, on the SIEM side, we also increased the rule count by ~625 new rules to over 1300 rules. Thats ~2k total rules across the 2 features! 🎉🎉 Looking forward to us enhancing coverage even more in 2024 🍻! github.com/elastic/detect…
account_circle
Elastic Security Labs(@elasticseclabs) 's Twitter Profile Photo

Analyzing data for threats can be an incredibly daunting task. Luckily, Terrance DeJesus and Eric Forte — two major contributors for the Global Threat Report — have laid out their step-by-step process of data analysis with Google Cloud: go.es.io/48iNjXO

account_circle
Samir(@SBousseaden) 's Twitter Profile Photo

if used to dump lsass and you have 4688 (process creation) enabled you can use it to identify traces of this technique
twitter.com/SBousseaden/st…

account_circle