| https://twitter.com/seadev3 |
| https://twitter.com/seadev3 |
Didn't we just do this a year ago?
A crash dump from 2021 🤯
Fantastic release from CISA, NSA, and many others highlighting use of living off the land techniques employed by Chinese threat actors.
Your EDRs won't save you from LOLBin use, you'll usually need to write custom rules to get that coverage.
https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_Living_off_the_Land.PDF
Microsoft named threat actor or fun ice cream flavor? 🍨
Peach Sandstorm
Midnight Blizzard
Raspberry Typhon
Caramel Tsunami
PISTACHIO TEMPEST
Top tier use of intel
"... hacktivists ordered several dozen different items to the address linked to his account, including souvenirs with the FBI logo (by which he is wanted) as well as a large shipment of adult toys, which they paid for with his card."
Ukrainian hacktivist team Cyber Resistance hacked the email of Lieutenant Colonel Sergey Alexandrovich Morgachev, an officer of the Russian Main Intelligence Directorate of the General Staff of the Russian Army (GRU), leader of the Russian hacker group APT 28, consisting of officers of the 85th Main Special Service Center of the GRU, military unit #26165.