Happy Thursday everyone!
Today's #readoftheday is brought to you by the Cybereason Security Services Team as they report their findings from a campaign they dubbed #CuckooSpear, and this is just part 1!
They attributed this campaign to #APT10, found some new tools and capabilities that the group has, and discuss the luring techniques, and much more! They talk about the techniques and tactics that they observed, they tools and LOLBAS's that were abused.
SPEAKING of techniques, APT10 used three different ways to gain persistence: scheduled tasks were created, they abused WMI Consumer Event (a method of subscribing to certain system events, then enabling an action of some sort), and creating Windows services.
This report provides great insight to the adversaries techniques, and I look forward to the rest of the parts! Enjoy and Happy Hunting!
CUCKOO SPEAR Part 1: Analyzing NOOPDOOR from an IR Perspective
https://www.cybereason.com/blog/cuckoo-spear-analyzing-noopdoor
Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting Cyborg Security, Now Part of Intel 471