Jason Craig

186 Followers
247 Following
77 Posts
full spectrum middle manager @ UmVtaXRseQ== .ex red team, blue team @ Pinterest, Dropbox , Facebook, Yahoo!, etc⚡️⚔️🛡🗝🤫
Keybasehttps://keybase.io/3141592f
Twitterhttps://twitter.com/3141592f
LIhttps://www.linkedin.com/in/3141592f/

Lunchtime threat hunt: map recent MS/Storm-0558 detections to Google Workpace/GMail. Summary: fail.

CISA noted that a US gov entity detected the incident via analysis of the `MailItemsAccessed` event type: "In Mid-June 2023, an FCEB agency observed MailItemsAccessed events with an unexpected ClientAppID and AppID in M365 Audit Logs." This event type was only available via more expensive E5 logging, which many/most don't pay for). MS changed this today to make available to more customers without paying extra, after pressure.

Maybe I'm missing something but I can't seem to find a Google Workspace equivalent event type in Security Center ( https://support.google.com/a/answer/11482175?sjid=7101640716602908317-NA , Enterprise Plus licensing). Does Google not log these types of events?

https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-193a

This technique of infecting common file types on target networks for reinfection is under appreciated by defenders and under utilized by adversaries. It’s why we prepared so thoroughly for migration of an Aurora victim to a clean network back in 2010.

Thrunting file mods by process other than the default URI handler is a great starting query, especially PowersHell.exe.

"Another interesting aspect of Gamaredon infections is that the threat actors plant as many as 120 malicious infected files per week on the compromised system to increase the likelihood of re-infection."

https://www.bleepingcomputer.com/news/security/gamaredon-hackers-start-stealing-data-30-minutes-after-a-breach/?

Gamaredon hackers start stealing data 30 minutes after a breach

Ukraine's Computer Emergency Response Team (CERT-UA) is warning that the Gamaredon hacking operates in rapid attacks, stealing data from breached systems in under an hour.

BleepingComputer
Kim vows to boost North Korea's nuclear capability after observing new ICBM launch

North Korean leader Kim Jong Un has vowed to bolster his country’s nuclear fighting capabilities as he supervised the second test-flight of a new intercontinental ballistic missile designed to strike the mainland United States. North Korea's state media reported Kim’s comments a day after the launch of the Hwasong-18 missile. Kim was quoted as saying deepening U.S. and South Korean hostilities require "more intense efforts to implement the line of bolstering nuclear war deterrent.” The Hwasong-18 is made for road mobility and has built-in solid propellant, making it more difficult to detect than liquid-fuel models before launch.

AP News
Russian Cybersecurity Executive Arrested for Alleged Role in 2012 Megahacks – Krebs on Security

Q3 OKRs find you uninspired? Our infrastructure security team is looking for a senior enterprise / corpsec security engineer who's looking to make an impact and move the program forward . Great mission, team and company

https://grnh.se/a6ecc2251us

Careers at Remitly

Careers at Remitly
In celebration of International Women’s Day I donated to Black Girls Hack. Please consider donating money or time to support a cause you believe is doing good.
Hot take on #BlackLotus & #UEFIBootKits : Due to the economics of payouts, it won't be widely used over time. Why? Victims will have to trash computers and replacement costs take away from ransom payouts. Attackers can get paid more without victims needing to trash PCs.
We are excited to announce the return of @volexity Cyber Sessions! Our next #meetup will be May 10 @ 6:30PM. Come listen as @tlansec & @attrc share their talks on #threatintel, #dfir & #memoryforensics. Doors open at 6:30PM. There is limited seating so reserve your spot now! https://www.meetup.com/volexity-cyber-sessions/events/291852488/
Firewall 0-day Investigations + Detecting and Triaging Modern Windows Rootkits, Wed, May 10, 2023, 6:30 PM | Meetup

This Meetup will feature two Volexity speakers: Tom Lancaster and Andrew Case. For the first session, Tom will be discussing a topic he presented at CyberThreat22 earlier t

Meetup

I often get asked for advice on how to get into this field (infosec generally and/or D&R specifically). Sometimes by people who work in adjacent fields. I also get asked for advice on how to demonstrate domain experience. Here is a great post by Efi Kaufman on how to build a nearly free home network security monitoring stack using all the same tools one would find in a corporate environment. Building this lab and running it for some time is invaluable experience for someone trying to enter the field. And a great resume builder to boot. One might even be well prepared for a number of interview questions.

https://www.linkedin.com/posts/efik_your-almost-free-home-network-detection-activity-7032752308106977280-3for?utm_source=share&utm_medium=member_desktop

Efi Kaufman on LinkedIn: Your (almost) free Home Network Detection Sensor using Splunk , Corelight… | 18 comments

Your (almost) free Home Network Detection Sensor using Splunk , Corelight and Raspberry Pi. 🍓Raspberry pi 64bit required. model 4 is recommended by Corelight… | 18 comments on LinkedIn

Dont worry, GoDaddy is the only one.