1. Zoho Assist RMM
2. QEMU & Cloudflared
3. Velociraptor for C2
and a wild story (to tell more about soon π): an attacker controlled Elastic stack for exfil ππ
| Website | https://huntress.com |
| https://twitter.com/huntresslabs | |
| https://www.linkedin.com/company/huntress-labs/ |
Check out @hrbrmstr today on @huntress's Tradecraft Tuesday at 1pm ET to chat about all things #React2Shell. π€
America's sweetheart, @JohnHammond of @huntress , is our confirmed keynote speaker.
(You didn't hear it from us, but our *unconfirmed* keynote speaker is Ed Sheeran. π This guy is part of our BCP.)
Conference and Workshop tickets on sale now! Enroll at BSides NoVA's Hacker U: Where Curiosity Becomes Capability.
Fri, Oct 10 | Sat, Oct 11 | GMU - Mason Square | Arlington, VA
π Help the Huntress SOC! If you're a SonicWall user you can help us gather more intelligence on this exploit and the surrounding activity by spinning up a free trial of SIEM:
β οΈ Huntress has been responding to an ongoing wave of high-severity Akira ransomware incidents originating from SonicWall devices.
Learn more about this active exploit and get an up-to-date list of indicators of compromise:
A likely zero-day vulnerability in SonicWall VPNs is being actively exploited to bypass MFA and deploy ransomware. Huntress advises disabling the VPN service immediately or severely restricting access via IP allow-listing. We're seeing threat actors pivot directly to domain controllers within hours of the initial breach.