On this DISCARDED episode, we uncover real-world detection wins, explore persistent threats like #TA505 and #Emotet, and dive into the importance of instincts in cybersecurity...

Because, as our guest puts it, sometimes good detection is all about the vibes. https://www.proofpoint.com/us/podcasts/hiding-in-plain-sight

Hiding in Plain Sight: How Defenders Get Creative with Image Detection | Proofpoint US

Hiding in Plain Sight: How Defenders Get Creative with Image Detection  

Proofpoint
Don't get phished by Spandex Tempest: attack.mitre.org/groups/G0092/. He will get your lovers email address with cobalt strike the email of your lover and encrypt their data with GlobeImposter. #cybersec #infosec #appsec #ta505 #spandex-tempest #threatmodeling #threat-modeling
TA505, Hive0065, Spandex Tempest, CHIMBORAZO, Group G0092 | MITRE ATT&CK®

In their most recent campaign, TA505 introduced a new weapon in their arsenal: the Remote Manipulator System (RMS) tool.

#TA505 #Cybersecurity #HackerGroup #Phishing #Ransomware #RMS

https://cybersec84.wordpress.com/2023/10/08/ta505-phishing-campaign-uses-remote-access-trojan-to-target-victims/

TA505 Phishing Campaign Uses Remote Access Trojan to Target Victims

TA505 is a well-known cybercriminal group with a history of launching high-volume phishing campaigns, often leveraging sophisticated malware and tactics. The group primarily focuses on financial ga…

CyberSec84 | Cybersecurity news.
🌘 #StopRansomware: CL0P勒索軟體幫派利用CVE-2023-34362 MOVEit漏洞
➤ 聯邦調查局和基礎設施安全與網路安全局(CISA)發布聯合 CSA,以傳播已知的 CL0P 勒索軟體 IOCs 和 TTPs。
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a
聯邦調查局和基礎設施安全與網路安全局(CISA)發布聯合 CSA,以傳播已知的 CL0P 勒索軟體 IOCs 和 TTPs。CL0P 勒索軟體幫派利用CVE-2023-34362漏洞,攻擊Progress Software的MOVEit Transfer,並在2023年6月之前進行了多次攻擊。TA505是全球最大的釣魚和惡意垃圾郵件分發者之一,估計已經入侵了超過3,000個美國組織和8,000個全球組織。CISA建議組織實施CSA中的建議,以減少CL0P勒索軟體和其他勒索軟體事件的可能性和影響。
+ 這是一個非常
#勒索軟體 #資安漏洞 #CVE-2023-34362 #CL0P #TA505 #MOVEit

Another week, another newsletter - catch up on the week's infosec news here:

https://opalsec.substack.com/p/soc-goulash-weekend-wrap-up-240423-300423

Researchers have found that nearly two years on, 2 in 3 installs of #Apache #Superset are still using default Flask Secret Keys - a configuration flaw which would allow an attacker to forge session cookies and access said servers with full administrative privileges.

#Kritec is a commodity #skimmer found installed on compromised #Magecart sites, with its code heavily obfuscated and customised to match the site's aesthetic in order to con users out of credit card details.

#FIN7 look to be popping instances of the #Veeam backup software that are unpatched for a recent vulnerability; a revised #ViperSoftX #infostealer now targets #1password and #keepass password vaults, and #TA505 deliver a new infostealer through a #GoogleAds campaign

#LockBit & #CL0P ransomware affiliates have been abusing a month-old vulnerability in the #PaperCut print management software to drop ransomware. With the cat out of the bag, security researchers have decided now is a great time to drop a PoC exploit on Github - I mean, why not let the skiddies get in on the action too, right?

The #blueteam have some great research worth reading on #Smishing via #AWS; detections for #SliverC2 and different implementations of #PsExec, as well as #Sigma integration for #SentinelOne and a #KQL hack for monitoring LOLDrivers.

Have a great week ahead folks, I hope this newsletter proves helpful!

https://opalsec.substack.com/p/soc-goulash-weekend-wrap-up-240423-300423

#infosec #cyber #news #newsletter #cybernews #infosec #infosecnews #informationsecurity #cybersecurity #hacking #security #technology #hacker #vulnerability #vulnerabilities #malware #ransomware #affiliate #dfir #soc #threatintel #threatintelligence #threathunting #detection #threatdetection #detectionengineering #flask #python #fraud #malvertising #clop #PoC #exploit #securityresearch #LOLBAS #LOLBIN #BYOVD

SOC Goulash: Weekend Wrap-Up

Papercut exploited en masse by CL0P, LockBit ransomware, PoC exploit leaked publicly. 2 in 3 Apache Superset installs vulnerable to compromise, and much more!

Opalsec

[Threatview.io]🌀 Our proactive hunter detected malicious #zoom download site distributing #TA505 malware

⚠️zoomapp[.]tech
🚫c2: download-cdn[.]com
⚙️tria.ge/230123-hmkksad…

#malware
#threatintel
#DFIR
#CTI
#CyberSecurity

Breaking the silence - Recent Truebot activity - Since August 2022, we have seen an increase in infections of Truebot (aka Silence.... https://blog.talosintelligence.com/breaking-the-silence-recent-truebot-activity/ #cve-2022-31199 #raspberryrobin #truebot #botnet #grace #ta505
Breaking the silence - Recent Truebot activity

Since August 2022, we have seen an increase in infections of Truebot (aka Silence.Downloader) malware. Truebot was first identified in 2017 and researchers have linked it to a threat actor called Silence Group that is responsible for several high-impact attacks on financial institutions in several countries around the world.

Cisco Talos Blog
New Ransom Payment Schemes Target Executives, Telemedicine – Krebs on Security

New Ransom Payment Schemes Target Executives, Telemedicine - Ransomware groups are constantly devising new methods for infecting victims and co... https://krebsonsecurity.com/2022/12/new-ransom-payment-schemes-target-executives-telemedicine/ #venusransomware #thecomingstorm #clopransomware #holdsecurity #webfraud2.0 #fabianwosar #ransomware #alexholden #emsisoft #tripwire #ta505 #cl0p
New Ransom Payment Schemes Target Executives, Telemedicine – Krebs on Security

New Ransom Payment Schemes Target Executives, Telemedicine – Krebs on Security