mRr3b00t    β€‹πŸ˜

3.3K Followers
193 Following
631 Posts

Threat Actors Attacking Office 365

######################

IdentityLogonEvents
| where TimeGenerated > ago(90d)
| where ActionType == "LogonFailed"
| where LogonType == "OAuth2:Token"
| summarize count() by bin(TimeGenerated, 1d), AccountName
| render columnchart

#######################
Found some baddies!

https://twitter.com/UK_Daniel_Card/status/1612615504044105728?s=20&t=VD7X0eCe4Sne3xOpu2sltg

mRr3b00t on Twitter

β€œanyone wanna check something for me? #Office365 #threats IdentityLogonEvents | where TimeGenerated > ago(90d) | where ActionType == "LogonFailed" | where LogonType == "OAuth2:Token" | summarize count() by bin(TimeGenerated, 1d), AccountName | render columnchart”

Twitter

ransomware defence aide...

work backwards from totally fucked and see what you can do to prevent or reduce the impact/likeylhood

Hopefully peeps are gonna get a chance to rest this XMAS. Last years Log4Hell wasn't exactly on anyone's wish lists!
morning tooters! TOOT TOOT

CYBER LASERS GO BRRRRRRRRRR

200K sites in 20 minutes!

Take Target List β€‹
Carve it Up πŸ”ͺ​
Run POWERSHELL JOB ▢️​
each job uses ASNC HTTP requests πŸ”«β€‹
Make Tea πŸ΅β€‹

more malware founds :)
malware detections so far from me downloading the internet!

So I'm downloading "THE ENTIRE INTERNET" - i know amazing right #lulz

and every once in a while I'm finding sites the HTML source detects as:

Name: Trojan:Script/Wacatac.H!ml
Name: Backdoor:PHP/Remoteshell.B

A few of these are detections form inside KALI . ISO file but lots of these are WEEEEBS

khamenei[.]ir

downloads as 1.66GB WTF

Morning World!