ClickFix-Variante nutzt WebDAV und trojanisierte Electron-App zur Malware-Verteilung

Entdeckt wurde die Aktivität ausschließlich durch gezieltes Threat Hunting – automatisierte Sicherheitskontrollen schlugen zu keinem Zeitpunkt Alarm.

https://www.all-about-security.de/clickfix-variante-nutzt-webdav-und-trojanisierte-electron-app-zur-malware-verteilung/

#threathunter #threat #clickfix #app #malware

Neue ClickFix-Variante zur Malware-Verteilung entdeckt

Die neue ClickFix-Variante nutzt gezielte Techniken zur Malware-Verteilung und umgeht gängige Sicherheitsmaßnahmen.

All About Security Das Online-Magazin zu Cybersecurity (Cybersicherheit). Ransomware, Phishing, IT-Sicherheit, Netzwerksicherheit, KI, Threats, DDoS, Identity & Access, Plattformsicherheit
Confronting Initial Access Techniques | Corelight

Learn how Corelight’s integration with CrowdStrike helps threat hunters detect signs of Initial Access, one of the tactics and techniques outlined in the MITRE ATT&CK framework.

ATT&CK-Updates im Blick behalten: Neue Funktionen für Sync & Mappings Editor

Damit Sicherheitsverantwortliche, Threat Hunter und Incident Responder nicht den Anschluss verlieren, hat MITRE zwei zentrale Werkzeuge überarbeitet: ATT&CK Sync und den Mappings Editor. Beide sollen helfen, Mappings schneller zu aktualisieren – und damit eine moderne, bedrohungsorientierte Verteidigung zu gewährleisten.

https://www.all-about-security.de/attck-updates-im-blick-behalten-neue-funktionen-fuer-sync-mappings-editor/

#att&ck #mitre #incidentresponse #threat #threathunter

ATT&CK Sync & Mappings Editor: Unterstützung für Threat Hunter

Entdecken Sie die neuen Funktionen der ATT&CK Sync & Mappings Editor Werkzeuge für Version 18 des ATT&CK-Frameworks von MITRE.

All About Security Das Online-Magazin zu Cybersecurity (Cybersicherheit). Ransomware, Phishing, IT-Sicherheit, Netzwerksicherheit, KI, Threats, DDoS, Identity & Access, Plattformsicherheit

New post in the Logwatcher's Zenit category has been published. It's the first part about how VS Code is a great tool for Cyberthreat Analysts. We're starting with key commands to speed up the workflow.

#threathunter #threathunting #threatanalysis #cybersecurity #blog

https://threathunter-chronicles.medium.com/logwatchers-zenit-01-vs-code-for-analysts-part-1-b7ead9123ed9

Logwatcher’s Zenit #01: VS Code for Analysts, part 1

At the summit of signal and noise lies the Logwatcher’s Zenit — a quiet place for analysts who squint at timestamps and whisper to correlation engines. This category explores log analysis, data…

Medium

“While human investigations tend to have a more strategic aim, dropping metaphorical anvils on internet infrastructure that poses a threat to users is only a fraction of the process.”

👨‍💻 Join one of Spamhaus' threat investigators as he reflects on the role of human investigation in the fight against Internet abuse and the reality of dealing with the weird world and quirks of cyber criminals.

Read the blog here:
https://www.spamhaus.org/resource-hub/investigations/between-input-and-output-the-enigma-of-being-a-spamhaus-threat-investigator/

#ThreatInvestigator #ThreatHunter #WeirdWorld #Cybercrime #InternetAbuse #CyberInvestigations #Spamhaus #TrustAndSafety #ThreatIntel #ThreatIntelligence #ThreatHunting

Investigations | The Enigma of being a Spamhaus Threat Investigator | Resource Hub

Meet one of our researchers, Jonas Arnold, as he sheds light on the threat investigators' role in Spamhaus and the fight against Internet abuse.

The Spamhaus Project

🌐 Every online interaction, every click, every message involves a domain and IP address. By submitting malicious activity you have the potential to effect change and contribute to a safer internet for millions 🛡️👫

Learn more about Spamhaus and how IP and domain data is used 🔽
https://submit.spamhaus.org/resources/why-submit

💪 Let’s make a difference together, one submission at a time!

#ThreatIntel #IP #Domains #Malware #EffectChange #ThreatHunter #infoSec #Community #ThreatResearch

The Spamhaus Project

🕵️​ Spamhaus researchers are observing a phishing scam imitating USAA - financial services for military personnel and veterans - sent from hijacked ISP accounts.

🔗​ The scammers are using link shortening services like bitly.ws and u.to to carry out their malicious deeds…and while it’s not always rocket science to spot a phishing attempt 🎣​, it’s alarming how these fraudsters can craft seemingly genuine emails.

We’ll let you hazard a guess at which one we are talking about!

❗​Stay vigilant, always check the from address, never follow suspicious links, and always use your bookmarked links.

And please submit any phishing scams you receive to the Threat Intel Community below 👇​👇​
https://submit.spamhaus.org

#Phishing #PhishOfTheWeek #ThreatIntel #ThreatHunter #ThreatIntelligence #SecurityResearch #CyberThreats

Threat Intel Community | The Spamhaus Project

🎉​ And we’re on Mastodon!

If you’re new to The Spamhaus Project, check out our bio above 🔝​

Ultimately, we’re here to build a community. A community of like-minded individuals, who want to make the internet a safer place. On Mastodon, we’ll be sharing latest threat intelligence from our researchers and threat hunters, and we’d like to invite you to do the same….

Earlier this month, we launched our Threat Intel Community, giving anyone the ability to submit malicious domains, IPs, email source codes, or URLs to Spamhaus through our user-friendly portal.

If you’re curious to know more, read this blog:
https://www.spamhaus.org/news/article/821/want-to-submit-data-be-our-guest

Or visit the Threat Intel Community here:
https://submit.spamhaus.org

#ThreatHunter #ThreatIntelligence #SecurityResearch #Phishing #Malware #Botnets #CyberThreats

Want to submit data? Be our guest!

If you're involved in #cybersecurity and #threathunting, @ActiveCountermeasures has a free 6-hour training course this Tuesday on how to use their AC-Hunter #linux #virtualmachine. They include everything needed ahead of time from presentation slides to lab downloads. Let me know if you'll be there!

#infosec #c2 #commandandcontrol #threathunter #cyberthreats #cyber #ubuntu

https://www.activecountermeasures.com/hunt-training/

Hunt Training - Active Countermeasures

Here you will find everything you need to complete our FREE 6-hour Threat Hunting Training course.

Active Countermeasures