Sources & Methods

64 Followers
79 Following
229 Posts
Monthly newsletter for cyber threat intelligence (CTI) information sources, tools, articles, events, and helpful tips
Websitehttps://sourcesmethods.com/?source=mastodon
Avatar designersmashingstocks
Heading into the weekend, here's a new issue of Sources & Methods to mark 2 years of running this CTI newsletter. Thank you for reading, I hope it serves you well! #CTI #threatintel https://sourcesmethods.com/sources-methods-newsletter-20/
Sources & Methods Newsletter #20 - November 2024

📁 Sources OSSF Malicious Package Registry - the Securing Critical Projects Working Group of the Open Source Security Foundation (OpenSSF) maintains a collection of reports of malicious packages identified in open source repositories in Open Source Vulnerability (OSV) format. 📰 Information Sophos - Pacific Rim: Inside the Counter-Offensive—The TTPs Used to

Sources & Methods
New @misp playbook! Tackle the week with JARM fingerprint investigations to track threat actor infrastructure using @censys , @shodan and MISP. Boost your #cti game with #automation and #infrastructure insights. https://github.com/MISP/misp-playbooks/blob/main/misp-playbooks/pb_jarm_verification-with_output.ipynb
misp-playbooks/misp-playbooks/pb_jarm_verification-with_output.ipynb at main · MISP/misp-playbooks

MISP Playbooks. Contribute to MISP/misp-playbooks development by creating an account on GitHub.

GitHub

New episode of DISCARDED where I chat with @bingohotdog about how she catches phish. 🎣

We dive into how to write detections, what to hunt for when finding phish kits, and some of her recent research on phishing scams. Tune in wherever you get your podcasts!

Apple: https://podcasts.apple.com/us/podcast/discarded-tales-from-the-threat-research-trenches/id1612506550?i=1000677061400

Spotify: https://open.spotify.com/episode/0NpdI41xywdaxgwlGQXew3?si=30jQ45GnQeO0pVOGZ9rrew

Web: https://www.spreaker.com/episode/scams-smishing-and-safety-nets-how-emerging-threats-catches-phish--62744117

Scams, Smishing, and Safety Nets: How Emerging Threats Catches Phish

Podcast Episode · DISCARDED: Tales From the Threat Research Trenches · 11/15/2024 · 51m

Apple Podcasts

Alleged Boss of "Scattered Spider" Hacking Group Arrested in Spain

A 22-year-old man from the United Kingdom arrested this week in Spain is allegedly the ringleader of Scattered Spider, a cybercrime group suspected of hacking into Twilio, LastPass, DoorDash, Mailchimp, and nearly 130 other organizations over the past two years.

https://krebsonsecurity.com/2024/06/alleged-boss-of-scattered-spider-hacking-group-arrested/

#scatteredspider #0ktapus #tylerb #sosa

Alleged Boss of ‘Scattered Spider’ Hacking Group Arrested – Krebs on Security

Say you, say me. Can it say together? The Natto Team is afraid to say probably not. Cyber attribution is complicated. It looks as if we have more questions than answers after all.

https://nattothoughts.substack.com/p/who-is-volt-typhoon-a-state-sponsored

Who is Volt Typhoon? A State-sponsored Actor? Or Dark Power?

Cyber attribution is complicated. After all the publicity about Volt Typhoon as a Chinese state hacking group, we have more questions than answers.

Natto Thoughts
My latest blog for SANS is about the importance of and the misunderstandings surrounding threat hunting in industrial networks. https://www.sans.org/blog/ot-threat-hunting-more-critical-than-ever/
OT Threat Hunting: More Critical Than Ever

A blog about threat hunting in operation technology environments.

Power outage during this year's #SLEUTHCON reminds me of #CYBERWARCON 2022 when the same thing happened... ⚡️🤔 Talks are still being recorded, and thank you to everyone working to get the livestream back!

Just published the second-longest blog post in my 14 year career as an independent reporter.

This story is the result of a ridiculous amount of research. I hope you like it, because I learned tons reporting this, and there needs to be a broader conversation about some of the issues raised by this research. The lede:

Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and Europe. An investigation into Stark Industries reveals it is being used as a global proxy network that conceals the true source of cyberattacks and disinformation campaigns against enemies of Russia.

https://krebsonsecurity.com/2024/05/stark-industries-solutions-an-iron-hammer-in-the-cloud/

Stark Industries Solutions: An Iron Hammer in the Cloud – Krebs on Security

We have compiled our Cyber Brief for the month of April 2024, with a summary of the main IT security developments, reported by open sources. It is available at https://cert.europa.eu/publications/threat-intelligence/cb24-05/.

🔖 Policy: EC encourages MS to adopt a unified approach to cryptography-safe digital infrastructure. 🇺🇸 🇯🇵 announce partnerships in AI research. 🇺🇸 published an advisory on securing election infrastructure against FIMI and charged 🇮🇷 nationals for involvement in cyber intrusions.

🕵️‍♀️ Cyberespionage: reporting of activity by allegedly 🇷🇺 🇨🇳 🇰🇵 threat actors. Additionally, Apple alerted iPhone users about potential targeting of a spyware by PSOAs.

💶 Cybercrime: top ransomware in 🇪🇺: Lockbit3, Blackbasta, Akira, Bianlian, and Hunter.
💥 Disruption: 🇫🇷 a hospital experienced a cyberattack, disrupting operations. Reportedly 🇷🇺 Sandworm and Muddling Meerkat have targeted 🇫🇷 energy infrastructure and manipulated 🇨🇳 Great Firewall's DNS responses, respectively. 🇨🇿 accused 🇷🇺 of attempting to sabotage European railways.

ℹ️ InfoOps: Reportedly 🇷🇺 🇨🇳 disinformation campaigns are heavily targeting 🇪🇺 and 🇺🇸 elections, 🇷🇺 through social media and fake websites, 🇨🇳 attempts to influence 🇺🇸 elections through covert accounts posing as Trump supporters. AI chatbots have inadvertently contributed to misinformation about the 🇪🇺 elections.

Cyber Brief 24-05 - April 2024

Cyber Brief 24-05 - April 2024

The 2024 Verizon #DBIR is out and it's the Year of the Vuln, as exploit attempts surge + orgs struggle to patch in time. Check out our analysis on the evolving landscape + how GreyNoise helps ID targeted attacks faster + buys remediation time. 🦾 https://buff.ly/3JJK6WR
2024 Verizon DBIR: Surviving the Year of the Vuln | GreyNoise Blog

Go inside the 2024 Verizon Data Breach Investigations Report (DBIR) to discover key takeaways and insights as GreyNoise analyzes the rise of vulnerability exploitation in cyber attacks.