Hunt & Hackett

@huntandhackett
44 Followers
0 Following
96 Posts

โš ๏ธ The Hacker News just spotlighted a growing threat: SEO poisoning campaigns delivering malware through fake tool websites.

Attackers are mimicking trusted apps like PuTTY, Zoom, and ChatGPT, pushing them high in search results. Over 8,500 SMB users were targeted in just four months.

The article breaks it down clearly. If you havenโ€™t read it yet, itโ€™s worth your time.

Read it here: https://thehackernews.com/2025/07/seo-poisoning-campaign-targets-8500.html

SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools

SEO poisoning delivers trojanized tools, targeting SMBs and spreading malware via fake websites

The Hacker News

๐Ÿ‘คThreat Actor Profile: Sandworm

Linked to Russiaโ€™s GRU and active in 60+ countries, Sandworm targets critical infrastructure with sabotage, espionage, and disruption. ๐Ÿ‡ท๐Ÿ‡บ

๐Ÿ”— Curious to learn more about this APT? Explore their threat profile in our Members' Portal: https://www.huntandhackett.com/members/actors/sandworm

๐Ÿ”— Not a Member yet? Sign-up today: https://www.huntandhackett.com/members/register

๐ŸšจNew #blogpost: This week we're unpacking our journey of using open-source software to build an innovative cloud-based IR lab from scratch, highlighting key obstacles we encountered along the road and explaining how we transformed these into opportunities.

We share:
๐Ÿ”ถ Velociraptor + Dissect hiccups;
๐Ÿ”ถ Misinterpretation of IPv6 addresses in Linux UTMP logs;
๐Ÿ”ถ Enhancing Timesketch for large scale investigations.

๐Ÿ”— https://www.huntandhackett.com/blog/turning-incident-response-challenges-into-scalable-solutions

Turning incident response challenges into scalable solutions

Find out how Hunt & Hackett transforms incident response challenges into scalable solutions using open-source software and a DevOps mindset.

Launching #DetectionsFromTheSOC ๐Ÿš€

We're excited to announce our new series, ๐˜‹๐˜ฆ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ง๐˜ณ๐˜ฐ๐˜ฎ ๐˜ต๐˜ฉ๐˜ฆ ๐˜š๐˜–๐˜Š, in which we share a behind-the-scenes look of how our SOC detects, investigates, and responds to real-world threats.

Case #1: Infostealer via fake CAPTCHA

We intercepted an attack where the intruder didnโ€™t break in, but logged in. The entry point? A fake โ€œIโ€™m not a robotโ€ CAPTCHA prompt.

๐Ÿ‘‰ Want to read the full story? Head on over to our LinkedIn to check it out: https://www.linkedin.com/feed/update/urn:li:activity:7336321179005165568

#detectionsfromthesoc #captcha #infostealer #cryptbot #soc #bec | Hunt & Hackett

Launching #DetectionsFromTheSOC ๐Ÿš€ We're happy to announce our new series, ๐˜‹๐˜ฆ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ง๐˜ณ๐˜ฐ๐˜ฎ ๐˜ต๐˜ฉ๐˜ฆ ๐˜š๐˜–๐˜Š, in which we share a behind-the-scenes look of how our SOC detects, investigates, and responds to real-world threats. ๐…๐จ๐ซ ๐จ๐ฎ๐ซ ๐Ÿ๐ข๐ซ๐ฌ๐ญ ๐ž๐๐ข๐ญ๐ข๐จ๐ง: ๐ข๐ง๐Ÿ๐จ๐ฌ๐ญ๐ž๐š๐ฅ๐ž๐ซ ๐๐ž๐ฉ๐ฅ๐จ๐ฒ๐ž๐ ๐ฏ๐ข๐š ๐Ÿ๐š๐ค๐ž ๐‚๐š๐ฉ๐ญ๐œ๐ก๐š  In the middle of the night, Hunt & Hackettโ€™s 24/7 SOC intercepted the early stages of a broader cyberattack. The attacker didnโ€™t break in, but logged in.     An endpoint was compromised using a fake #CAPTCHA page โ€“ you know, one of those โ€œIโ€™m not a robotโ€ checks. Only this one tricked the user into running a command via the keyboard shortcut Win + R. That command launched a hidden process and deployed a known #infostealer, likely #Cryptbot.    ๐–๐ก๐š๐ญ ๐ก๐š๐ฉ๐ฉ๐ž๐ง๐ž๐?   Our SOC flagged a suspicious mshta.exe process making an outbound connection to a previously unknown domain. This quickly escalated: ๐Ÿ‘‰ User was tricked into copy-pasting a command that secretly launched mshta.exe  ๐Ÿ‘‰ mshta.exe triggered PowerShell, which contacted additional anomalous domains and executed fileless malware  ๐Ÿ‘‰ PowerShell launched Chrome/Edge with the --remote-debugging-port=9203 flag โ€“ a known abuse method to extract browser credentials  ๐Ÿ‘‰ The process accessed files in the Downloads folder All signs pointed to credential theft and system reconnaissance.    ๐‡๐จ๐ฐ ๐ฐ๐ž ๐๐ž๐ญ๐ž๐œ๐ญ๐ž๐ ๐ข๐ญ:   One of our behavioural detection rules flagged:  ๐Ÿ‘‰ Use of mshta.exe in user context reaching unknown domains   ๐Ÿ‘‰Obfuscated PowerShell activity   ๐Ÿ‘‰Abuse of --remote-debugging-port in Chrome โ€“ a known credential-stealing tactic  This combination triggered a high-confidence detection, prompting an alert at our #SOC and enabling a fast response & remediation โ€“ even at 3AM.    ๐‘๐ž๐ฆ๐ž๐๐ข๐š๐ญ๐ข๐จ๐ง:  ๐Ÿ‘‰ Clean install of the endpoint  ๐Ÿ‘‰ Blocked malicious domains  ๐Ÿ‘‰ Revoked all sessions and reset credentials    This case shows how infostealers can be the first step in modern attacks, giving threat actors access to credentials, browser sessions, and local files. From there, they can move laterally, escalate privileges, and pave the way for bigger attacks like ransomware or business email compromise (#BEC) without you knowing it. In short: infostealers are a launchpad for full-scale breaches.    ๐ˆ๐Ž๐‚๐ฌ:  ๐Ÿ‘พ hxxps[:]//afliam[.]shop  ๐Ÿ‘พ b[.]watchcollision[.]xyz  ๐Ÿ‘พ blisspicks[.]shop 

๐ŸŽค Weโ€™re proud to sponsor and speak at Hague TIX on June 10!

The event is a focused gathering of Europeโ€™s top threat intelligence minds.

We'll explore Europeโ€™s path to cyber resilience and strategic autonomy, and dive into Lazarus and SeaTurtle operations in the Netherlands.

#CyberSecurity #ThreatIntel #HagueTIX #APT

Our next CyberConnect session is coming up: Security in Motion!

In this session, tailored for security, IT, and risk professionals, we explore how changing geopolitical dynamics, growing technological dependencies, and new attack techniques are raising the bar for digital resilience.

Visit our website for more information, and to sign-up: https://www.huntandhackett.com/security-in-beweging

Security in beweging | Hunt & Hackett

Ontdek hoe geopolitieke spanningen, technologische afhankelijkheden en veranderende aanvalstechnieken de eisen aan digitale weerbaarheid verhogen.

๐Ÿšจ New blog!

In it, we dive into reverse-engineering AFD.sys (a hidden part of Windows networking) to surface live socket data from other processes. This unlocks new capabilities for forensics, debugging, and reverse engineering.

๐Ÿ“ƒ Read it here: https://www.huntandhackett.com/blog/improving_afd_socket_visibility

๐Ÿ”ง Explore our tool: https://github.com/huntandhackett/AfdSocketViewer

Improving AFD Socket Visibility for Windows Forensics & Troubleshooting

This blog post explains the basics of Ancillary Function Driver API and how it can help explore networking activity on Windows systems.

We've updated our threat landscape on the logistics sector ๐Ÿš›

On it, you'll find detailed actor overviews, analyses of recent cyberattacks in the logistics sector, and insights into emerging cybersecurity trends.

Curious? Take a look: https://www.huntandhackett.com/members/sectors/logistics

Als advocaat ben je vaak het eerste aanspreekpunt bij een cyberincident. Maar hoe zorg je dat jouw cliรซnt meteen de juiste stappen zet? En hoe werk je optimaal samen met technische experts onder tijdsdruk?

Op 16 mei organiseren we een interactieve workshop voor advocaten die cliรซnten adviseren op het gebied van privacy, informatiebeveiliging en incident response waarin we praktische kennis over digitale hygiรซne combineren met onze ervaringen uit het veld.

Sign-up: https://www.huntandhackett.com/crisisworkshop-advocaten

Crisisworkshop voor advocaten

Cyberincidenten zijn aan de orde van de dag โ€“ en als advocaat ben je vaak de eerste persoon die gebeld wordt. Maar wat zijn je eerder acties?

๐‰๐จ๐ข๐ง ๐ฎ๐ฌ ๐š๐ญ ๐†๐จ๐จ๐ ๐ฅ๐ž ๐€๐ฆ๐ฌ๐ญ๐ž๐ซ๐๐š๐ฆ ๐Ÿ๐จ๐ซ ๐จ๐ฎ๐ซ ๐ฎ๐ฉ๐œ๐จ๐ฆ๐ข๐ง๐  ๐ฌ๐ž๐ฌ๐ฌ๐ข๐จ๐ง:
Securing Operational Technology: Fast Response, Strong Recovery

๐˜ž๐˜ฉ๐˜ข๐˜ต ๐˜ฉ๐˜ข๐˜ฑ๐˜ฑ๐˜ฆ๐˜ฏ๐˜ด ๐˜ธ๐˜ฉ๐˜ฆ๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ด๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ๐˜ด ๐˜บ๐˜ฐ๐˜ถ ๐˜ณ๐˜ฆ๐˜ญ๐˜บ ๐˜ฐ๐˜ฏ ๐˜ฆ๐˜ท๐˜ฆ๐˜ณ๐˜บ ๐˜ฅ๐˜ข๐˜บ ๐˜ด๐˜ถ๐˜ฅ๐˜ฅ๐˜ฆ๐˜ฏ๐˜ญ๐˜บ ๐˜ด๐˜ต๐˜ฐ๐˜ฑ ๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ๐˜ช๐˜ฏ๐˜จ?

Together with Xebia, weโ€™re hosting a session on how to boost operational resilience, secure OT environments, and align with evolving regulations.

Sign-up here: https://www.huntandhackett.com/securing-ot

Securing Operational Technology: Fast Response, Strong Recovery

In this session, Hunt & Hackett and Xebia will collaborate to strengthen Operational Technology security, ensuring rapid response and resilient recovery. Register now.