Hunt & Hackett

@huntandhackett
46 Followers
0 Following
99 Posts

Last week, ENISA released its Threat Landscape 2025.

It offers a detailed look at how Europeโ€™s cyber ecosystem is evolving. The picture that emerges shows growing strain, where interconnected systems and persistent threats keep testing resilience.

Among the developments: faketivism blurring lines between actors, phishing services lowering barriers, and AI reshaping how attacks unfold.

๐Ÿ“„ Read the report here: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2025

ENISA Threat Landscape 2025 | ENISA

ENISA is the EU agency dedicated to enhancing cybersecurity in Europe. They offer guidance, tools, and resources to safeguard citizens and businesses from cyber threats.

๐Ÿ” New #blogpost

At H2, we recently moved from authenticator apps to #YubiKey (FIDO2) for company-wide MFA in Entra ID.

Why? Because it enables phishing-resistant, passwordless sign-ins at scale, raising the bar for our security.

But this move didn't come without its challenges. Read about our journey here: https://www.huntandhackett.com/blog/raising-security-with-yubikey

Raising security with organization-wide YubiKey (FIDO2) in Entra ID

Find out how Hunt & Hackett transforms incident response challenges into scalable solutions using open-source software and a DevOps mindset.

Cyber espionage reaches far beyond governments, it impacts more organisations than you think.

At our next CyberConnect on Sept 9 in The Hague, weโ€™ll share real investigations, explain why even low-profile orgs are targeted, and give a live demo on tracking campaigns.

Seats are limited. Sign up today: https://www.huntandhackett.com/understanding-cyber-espionage

#CyberSecurity #ThreatIntelligence #CyberEspionage

โš ๏ธ The Hacker News just spotlighted a growing threat: SEO poisoning campaigns delivering malware through fake tool websites.

Attackers are mimicking trusted apps like PuTTY, Zoom, and ChatGPT, pushing them high in search results. Over 8,500 SMB users were targeted in just four months.

The article breaks it down clearly. If you havenโ€™t read it yet, itโ€™s worth your time.

Read it here: https://thehackernews.com/2025/07/seo-poisoning-campaign-targets-8500.html

SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools

SEO poisoning delivers trojanized tools, targeting SMBs and spreading malware via fake websites

The Hacker News

๐Ÿ‘คThreat Actor Profile: Sandworm

Linked to Russiaโ€™s GRU and active in 60+ countries, Sandworm targets critical infrastructure with sabotage, espionage, and disruption. ๐Ÿ‡ท๐Ÿ‡บ

๐Ÿ”— Curious to learn more about this APT? Explore their threat profile in our Members' Portal: https://www.huntandhackett.com/members/actors/sandworm

๐Ÿ”— Not a Member yet? Sign-up today: https://www.huntandhackett.com/members/register

๐ŸšจNew #blogpost: This week we're unpacking our journey of using open-source software to build an innovative cloud-based IR lab from scratch, highlighting key obstacles we encountered along the road and explaining how we transformed these into opportunities.

We share:
๐Ÿ”ถ Velociraptor + Dissect hiccups;
๐Ÿ”ถ Misinterpretation of IPv6 addresses in Linux UTMP logs;
๐Ÿ”ถ Enhancing Timesketch for large scale investigations.

๐Ÿ”— https://www.huntandhackett.com/blog/turning-incident-response-challenges-into-scalable-solutions

Turning incident response challenges into scalable solutions

Find out how Hunt & Hackett transforms incident response challenges into scalable solutions using open-source software and a DevOps mindset.

Launching #DetectionsFromTheSOC ๐Ÿš€

We're excited to announce our new series, ๐˜‹๐˜ฆ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ง๐˜ณ๐˜ฐ๐˜ฎ ๐˜ต๐˜ฉ๐˜ฆ ๐˜š๐˜–๐˜Š, in which we share a behind-the-scenes look of how our SOC detects, investigates, and responds to real-world threats.

Case #1: Infostealer via fake CAPTCHA

We intercepted an attack where the intruder didnโ€™t break in, but logged in. The entry point? A fake โ€œIโ€™m not a robotโ€ CAPTCHA prompt.

๐Ÿ‘‰ Want to read the full story? Head on over to our LinkedIn to check it out: https://www.linkedin.com/feed/update/urn:li:activity:7336321179005165568

#detectionsfromthesoc #captcha #infostealer #cryptbot #soc #bec | Hunt & Hackett

Launching #DetectionsFromTheSOC ๐Ÿš€ We're happy to announce our new series, ๐˜‹๐˜ฆ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ง๐˜ณ๐˜ฐ๐˜ฎ ๐˜ต๐˜ฉ๐˜ฆ ๐˜š๐˜–๐˜Š, in which we share a behind-the-scenes look of how our SOC detects, investigates, and responds to real-world threats. ๐…๐จ๐ซ ๐จ๐ฎ๐ซ ๐Ÿ๐ข๐ซ๐ฌ๐ญ ๐ž๐๐ข๐ญ๐ข๐จ๐ง: ๐ข๐ง๐Ÿ๐จ๐ฌ๐ญ๐ž๐š๐ฅ๐ž๐ซ ๐๐ž๐ฉ๐ฅ๐จ๐ฒ๐ž๐ ๐ฏ๐ข๐š ๐Ÿ๐š๐ค๐ž ๐‚๐š๐ฉ๐ญ๐œ๐ก๐š  In the middle of the night, Hunt & Hackettโ€™s 24/7 SOC intercepted the early stages of a broader cyberattack. The attacker didnโ€™t break in, but logged in.     An endpoint was compromised using a fake #CAPTCHA page โ€“ you know, one of those โ€œIโ€™m not a robotโ€ checks. Only this one tricked the user into running a command via the keyboard shortcut Win + R. That command launched a hidden process and deployed a known #infostealer, likely #Cryptbot.    ๐–๐ก๐š๐ญ ๐ก๐š๐ฉ๐ฉ๐ž๐ง๐ž๐?   Our SOC flagged a suspicious mshta.exe process making an outbound connection to a previously unknown domain. This quickly escalated: ๐Ÿ‘‰ User was tricked into copy-pasting a command that secretly launched mshta.exe  ๐Ÿ‘‰ mshta.exe triggered PowerShell, which contacted additional anomalous domains and executed fileless malware  ๐Ÿ‘‰ PowerShell launched Chrome/Edge with the --remote-debugging-port=9203 flag โ€“ a known abuse method to extract browser credentials  ๐Ÿ‘‰ The process accessed files in the Downloads folder All signs pointed to credential theft and system reconnaissance.    ๐‡๐จ๐ฐ ๐ฐ๐ž ๐๐ž๐ญ๐ž๐œ๐ญ๐ž๐ ๐ข๐ญ:   One of our behavioural detection rules flagged:  ๐Ÿ‘‰ Use of mshta.exe in user context reaching unknown domains   ๐Ÿ‘‰Obfuscated PowerShell activity   ๐Ÿ‘‰Abuse of --remote-debugging-port in Chrome โ€“ a known credential-stealing tactic  This combination triggered a high-confidence detection, prompting an alert at our #SOC and enabling a fast response & remediation โ€“ even at 3AM.    ๐‘๐ž๐ฆ๐ž๐๐ข๐š๐ญ๐ข๐จ๐ง:  ๐Ÿ‘‰ Clean install of the endpoint  ๐Ÿ‘‰ Blocked malicious domains  ๐Ÿ‘‰ Revoked all sessions and reset credentials    This case shows how infostealers can be the first step in modern attacks, giving threat actors access to credentials, browser sessions, and local files. From there, they can move laterally, escalate privileges, and pave the way for bigger attacks like ransomware or business email compromise (#BEC) without you knowing it. In short: infostealers are a launchpad for full-scale breaches.    ๐ˆ๐Ž๐‚๐ฌ:  ๐Ÿ‘พ hxxps[:]//afliam[.]shop  ๐Ÿ‘พ b[.]watchcollision[.]xyz  ๐Ÿ‘พ blisspicks[.]shop 

๐ŸŽค Weโ€™re proud to sponsor and speak at Hague TIX on June 10!

The event is a focused gathering of Europeโ€™s top threat intelligence minds.

We'll explore Europeโ€™s path to cyber resilience and strategic autonomy, and dive into Lazarus and SeaTurtle operations in the Netherlands.

#CyberSecurity #ThreatIntel #HagueTIX #APT

Our next CyberConnect session is coming up: Security in Motion!

In this session, tailored for security, IT, and risk professionals, we explore how changing geopolitical dynamics, growing technological dependencies, and new attack techniques are raising the bar for digital resilience.

Visit our website for more information, and to sign-up: https://www.huntandhackett.com/security-in-beweging

Security in beweging | Hunt & Hackett

Ontdek hoe geopolitieke spanningen, technologische afhankelijkheden en veranderende aanvalstechnieken de eisen aan digitale weerbaarheid verhogen.

๐Ÿšจ New blog!

In it, we dive into reverse-engineering AFD.sys (a hidden part of Windows networking) to surface live socket data from other processes. This unlocks new capabilities for forensics, debugging, and reverse engineering.

๐Ÿ“ƒ Read it here: https://www.huntandhackett.com/blog/improving_afd_socket_visibility

๐Ÿ”ง Explore our tool: https://github.com/huntandhackett/AfdSocketViewer

Improving AFD Socket Visibility for Windows Forensics & Troubleshooting

This blog post explains the basics of Ancillary Function Driver API and how it can help explore networking activity on Windows systems.