Launching #DetectionsFromTheSOC ๐
We're excited to announce our new series, ๐๐ฆ๐ต๐ฆ๐ค๐ต๐ช๐ฐ๐ฏ๐ด ๐ง๐ณ๐ฐ๐ฎ ๐ต๐ฉ๐ฆ ๐๐๐, in which we share a behind-the-scenes look of how our SOC detects, investigates, and responds to real-world threats.
Case #1: Infostealer via fake CAPTCHA
We intercepted an attack where the intruder didnโt break in, but logged in. The entry point? A fake โIโm not a robotโ CAPTCHA prompt.
๐ Want to read the full story? Head on over to our LinkedIn to check it out: https://www.linkedin.com/feed/update/urn:li:activity:7336321179005165568
#detectionsfromthesoc #captcha #infostealer #cryptbot #soc #bec | Hunt & Hackett
Launching #DetectionsFromTheSOC ๐ We're happy to announce our new series, ๐๐ฆ๐ต๐ฆ๐ค๐ต๐ช๐ฐ๐ฏ๐ด ๐ง๐ณ๐ฐ๐ฎ ๐ต๐ฉ๐ฆ ๐๐๐, in which we share a behind-the-scenes look of how our SOC detects, investigates, and responds to real-world threats. ๐ ๐จ๐ซ ๐จ๐ฎ๐ซ ๐๐ข๐ซ๐ฌ๐ญ ๐๐๐ข๐ญ๐ข๐จ๐ง: ๐ข๐ง๐๐จ๐ฌ๐ญ๐๐๐ฅ๐๐ซ ๐๐๐ฉ๐ฅ๐จ๐ฒ๐๐ ๐ฏ๐ข๐ ๐๐๐ค๐ ๐๐๐ฉ๐ญ๐๐ก๐ In the middle of the night, Hunt & Hackettโs 24/7 SOC intercepted the early stages of a broader cyberattack. The attacker didnโt break in, but logged in. An endpoint was compromised using a fake #CAPTCHA page โ you know, one of those โIโm not a robotโ checks. Only this one tricked the user into running a command via the keyboard shortcut Win + R. That command launched a hidden process and deployed a known #infostealer, likely #Cryptbot. ๐๐ก๐๐ญ ๐ก๐๐ฉ๐ฉ๐๐ง๐๐? Our SOC flagged a suspicious mshta.exe process making an outbound connection to a previously unknown domain. This quickly escalated: ๐ User was tricked into copy-pasting a command that secretly launched mshta.exe ๐ mshta.exe triggered PowerShell, which contacted additional anomalous domains and executed fileless malware ๐ PowerShell launched Chrome/Edge with the --remote-debugging-port=9203 flag โ a known abuse method to extract browser credentials ๐ The process accessed files in the Downloads folder All signs pointed to credential theft and system reconnaissance. ๐๐จ๐ฐ ๐ฐ๐ ๐๐๐ญ๐๐๐ญ๐๐ ๐ข๐ญ: One of our behavioural detection rules flagged: ๐ Use of mshta.exe in user context reaching unknown domains ๐Obfuscated PowerShell activity ๐Abuse of --remote-debugging-port in Chrome โ a known credential-stealing tactic This combination triggered a high-confidence detection, prompting an alert at our #SOC and enabling a fast response & remediation โ even at 3AM. ๐๐๐ฆ๐๐๐ข๐๐ญ๐ข๐จ๐ง: ๐ Clean install of the endpoint ๐ Blocked malicious domains ๐ Revoked all sessions and reset credentials This case shows how infostealers can be the first step in modern attacks, giving threat actors access to credentials, browser sessions, and local files. From there, they can move laterally, escalate privileges, and pave the way for bigger attacks like ransomware or business email compromise (#BEC) without you knowing it. In short: infostealers are a launchpad for full-scale breaches. ๐๐๐๐ฌ: ๐พ hxxps[:]//afliam[.]shop ๐พ b[.]watchcollision[.]xyz ๐พ blisspicks[.]shop