Ian Kenefick

190 Followers
275 Following
30 Posts
Hunter 🏹 Defender 🛡Threat Intelligence 🕵🏻‍♂️ & Malware Analysis 🦠 Fortunate to work @ Trend Micro. Happy to help whenever possible.

Recent #SocGholish infra for blocking.

bookings.escapesdollars[.]com -> 89.117.67[.]225 (Limestone)
images.inversionflorida[.]com -> 23.146.184[.]110 (Atomic)
panel.futurainternationalrealty[.]com -> 166.88.159[.]43 (ASNET)
files.cellustrong[.]com -> 209.141.50[.]198 (PONYNET)
desk.miamionly[.]com -> 45.41.187[.]31 (GLOBALCOMPASS)
concept.mexicanstays[.]com -> 51.81.241[.]142 (OVH SAS)
cpanel.experiencejiujitsu[.]com -> 89.116.171[.]195 (LIMESTONENETWORKS)

cc @monitorsg

How's this for a conundrum? You spend several months of your life trying to uncover the real-life identity of perhaps one of the older and most experienced ransomware access brokers out there. And when you do find this person, you discover they are now (also?) serving in a very important technical role for the Ukrainian military that involves successfully targeting and killing large numbers of Russian invaders.

I'm not sure the timing is right for this person's story, but it's a good one.

#InfoSec FYI: There's a massive #typosquatting campaign targeting PyPI. Someone's clearly reached the automation section of "Black Hat Python" 🙄

This is the same actor as highlighted by Phylum yesterday - currently they're pushing a cryptostealer everywhere they can, but who knows what's next.

Recently, they've started typosquatting the following packages (& showing example typosquat):
* xlsxwriter (ex. xlsxwwriter)
* urllib3 (rllib3)
* simplejson (simplejsn)
* requests-toolbelt (requests-toollbelt)
* discord-webhook (disocrd-webhook)
* discord-py (discod-py)
* websocket-client (weebsocket-client)
* openpyxl (oepnpyxl)
* pillow (pilloow)
* click (clickk)
* pysocks (ysocks)
* psutil (psuil)
* gitpython (gitpythn)
* pycodestyle (pycodestye)
* prompt-toolkit (prompt-toolkiit)
* beautifulsoup (baeutifulsoup)

Edit: PyPI has removed the above!

If your company uses your own PyPI mirror, I'd recommend disallowing new packages released within the past ~week (as a general precaution, tbh).

#IcedID C2s for blocking!

tibloautonef[.]com - 94.140.114[.]228
nomaeradiur[.]com - 94.140.114[.]228
trotimera[.]com - 5.255.107[.]149
swordnifhing[.]com - 5.255.107[.]149
trustopaj[.]com - 45.82.247[.]121
ulrtonemio[.]com - 45.82.247[.]121
rolewzullo[.]com - 85.239.60[.]241
trastbaki[.]com - 85.239.60[.]241
iskopila[.]com - 94.232.46[.]210
scanproluet[.]com - 45.89.98[.]138
spotifrezise[.]com - 80.66.88[.]87
headertolz[.]com - 80.66.88[.]87

Found this new #BatLoader C&C Server - statisticpixels[.]com . Doesn't appear to be in use yet...

More #Icedid - burn them

plumxeto[.]pics
swertoolsken[.]com
wcollopracket[.]com
needzolapa[.]com

#IcedID C2's for blocking

5.230.74[.]203
qzmeat[.]cyou
felzater[.]lol

168.100.9[.]112
brigottafkor[.]com
kaesanor[.]homes

216.73.159[.]134
startevopadra[.]com

207.154.221[.]213
tailwera[.]cloud
jozzinafkae[.]com
pleoweld[.]homes
quelasoup[.]homes

5.230.68[.]48
ijoyzymama[.]com
skaiortalop[.]com

185.99.133[.]122
elcapolis[.]com
ertusaporf[.]com

Hi everyone! Trend is hiring a Threat Researcher for Ottawa! If you are interested, please reach out to me BEFORE you apply!

https://trendmicro.wd3.myworkdayjobs.com/External/job/Ottawa/Threat-Researcher_R0004954

#trendmicro #hiring #position #threat #researcher #security #ottawa #canada

Threat Researcher

Don't see the dream job you are looking for? Drop off your contact information and resume. We will reach out to you if we find the perfect fit! For over 30 years, Trend Micro's unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats. We embrace change, empower people, and encourage innovation in a connected world. Our diversity and multicultural workforce are key contributing factors to our success across the globe. At Trend Micro, we're always looking for top talent and you will work with the best. With us, you have the opportunity to thrive in an industry that is dominating the news worldwide. Explore Working at Trend https://www.trendmicro.com/en_us/about/careers.html Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, world-leading global threat research and intelligence, and continuous innovation, our cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints With 7,000 employees across 65 countries, and the world’s most advanced global threat research and intelligence, Trend Micro enables organizations to simplify and secure their connected world. TrendMicro.com Overview: We are a world class Information Security team, one of the best in Canada. We specialize in vulnerability research and rules development. Located in Ottawa, researching for Trend Micro’s flagship DataCenter Security Product called Deep Security and Cloud Security Service Trend Micro Cloud One. The team is referred to as our Deep Security Labs team. Working with other global teams, this team is chartered to keep abreast with the latest vulnerabilities and provide timely protection to our customers by preventing network threats and detecting local indicators of compromise. We are looking for someone passionate about information security. Whether you like to dig into vulnerabilities and exploits, you love hacking web applications, studying malware, playing with metasploit or running pen-tests; we are interested in helping you develop your passion further. We are on a mission to prevent servers from being attacked against vulnerabilities and threats. You don’t have to be a security expert. If you understand computers and TCP/IP networks, HTTP and other layer 7 protocols well you are more than welcome to apply for this position. Responsibilities: Write and Test IPS, Integrity Monitoring and Log Inspection rules for quality, functionality, false positives and false negatives, regression, performance, etc. This involves: Vulnerability/attack scenario reproduction to ensure the attack is well understood and well protected against Carry out testing with exploit PoCs, viruses, Metasploit and other exploit tools. Review for flaws in the rule and relevant codes which have a tendency of being logical/state/detail oriented Security patch analysis Implement and design small-scale to medium-scale automation in order to simplify testing tasks, improve and assure the best quality using Perl, python, ruby etc. Vulnerability and threat monitoring Vulnerability scanner execution & results analysis Develop and perform test cases based on the objectives of the test Script various tasks and activities by using bash, ruby, batch, perl Understand and interpret the detailed information on vulnerabilities and exploits in pursuance of quality testing, test cases generation and quality assurance Utilize common tools such as VMware suite, SQL, binary editors, terminal clients, RDP clients, browser’s developers’ tools Performance testing Perform weekly routine responsibilities such as: shipping/testing of the virtual patches, rule testing, QA review, reproductions Experience Required: Good hands-on Security tools, vulnerability scanners, fuzzing tools, pen testing tools. Knowledge in TCP/IP protocols and deeper knowledge of application layer protocols like HTTP, FTP, DNS. Experience with signature development/testing OR penetration testing, along with writing exploit code. Solid understanding of Operating Systems Internals. Knowledge of scripting languages. Knowledge of Cloud Service and Container. Desired skills: A passion for information security. In-depth knowledge of various protocols like HTTP, CIFS, MSRPC, SMB, IMAP, NTP, SNMP etc. In our Ottawa teams, we enjoy: Small team settings with passionate, motivated team mates Top-notch benefits and competitive compensation Opportunities to pursue continued training, industry events and conferences Frequent team activities, project celebrations, and knowledge sharing Collaborative office workspaces with unique and spacious lounge areas Regular Hack Days! Foosball and ping-pong Free coffee, tea and snacks Secure indoor bicycle room & shower/change rooms Trend Micro has been recognized as one of the National Capital Region's top employers. If you are interested in learning more, follow the link to see why working at Trend Micro could be the right move for you https://content.eluta.ca/top-employer-trend-micro-canada-technologies Our Hiring Process: Building our team at Trend is an incredibly important shared responsibility. The typical process looks like this: After you apply online, if you're selected for an interview you will hear from someone in our recruitment team A quick initial call with a recruiter is typical, and you can use it to share more about yourself and get answers to questions about the position A multi-part interview that gives you the chance to meet one or more members of the team you'll be joining, as well as a manager. Next comes the offer stage and a final call with a manager to discuss expectations and terms. At Trend Micro, we embrace change, empower people, and encourage innovation in a connected world. Our diversity and multicultural workforce are key contributing factors to our success across the globe. Trend Micro welcomes and encourages applications from people with disabilities. Accommodations are available on request for candidates taking part in all aspects of the selection process.

#IcedID 🤡's are trying to ruin Christmas.

Block these 🎅

joyzibrakzi[.]com -> 103.68.108[.]10 deployed at 2022-12-24 11:47:47
owisportlittle[.]com -> 37.235.56[.]94 deployed at 2022-12-24 09:56:38