Challenge: How to deploy browser adblocking company-wide without possibly hitting our own global properties, internal sites, or getting noticed by marketing? Push a uBlock Origin policy with Hroup Policy including a RegEx that disables it on domains with our company name.

SwiftOnSecurity's tweet image. Challenge: How to deploy browser adblocking company-wide without possibly hitting our own global properties, internal sites, or getting noticed by marketing?
Push a uBlock Origin policy with Hroup Policy including a RegEx that disables it on domains with our company name.

Adblocking is hyper-effective at quenching network threat alarms, massively reducing proxy log volume during threat investigations, and stopping users redirected to phishing and malware. Current corporate uBlock Origin configuration. I may move us to AdGuard instead of EasyList.

SwiftOnSecurity's tweet image. Adblocking is hyper-effective at quenching network threat alarms, massively reducing proxy log volume during threat investigations, and stopping users redirected to phishing and malware.
Current corporate uBlock Origin configuration. I may move us to AdGuard instead of EasyList.

Yes I'm writing a blog on How We Do Browsers from top to bottom, but I use Twitter because I'm too impatient. I've been doing this for many many years and have even given feedback/bugs to the Chrome, Edge, and Firefox teams.


AS I WAS SAYING. If you have MDE/ATP and your SOC is getting deluged with alerts recently, it's because you don't have adblocking deployed to those machines yet. Adblocking STOPS THE BEGINNING OF THE ATTACK FROM EXISTING.

Microsoft researchers are tracking an ongoing wide-ranging click fraud campaign where attackers monetize clicks generated by a browser node-webkit or malicious browser extension secretly installed on devices. Microsoft attributes the attack to a threat actor tracked as DEV-0796.

MsftSecIntel's tweet image. Microsoft researchers are tracking an ongoing wide-ranging click fraud campaign where attackers monetize clicks generated by a browser node-webkit or malicious browser extension secretly installed on devices. Microsoft attributes the attack to a threat actor tracked as DEV-0796.


I don't just make this shit up you know like I'm a human person with experiences and feelings.


Your users are getting these malicious advertising redirects and workflow captures, browsing local news sites. All the time.

#SolarMarker pretending to be a chrome update. #Signed "Game Warriors Limited" tria.ge/220926-xqpq8sc… Back to PowerShell, file in the startup directory, PowerShell registry. C2: 146.70.53.146 Dropper: virustotal.com/gui/file/bb71d… Backdoor: virustotal.com/gui/file/db9dd… @JAMESWT_MHT

SquiblydooBlog's tweet image. #SolarMarker pretending to be a chrome update. 
#Signed "Game Warriors Limited"

<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://tria.ge/220926-xqpq8schej/behavioral2">tria.ge/220926-xqpq8sc…</a>
Back to PowerShell, file in the startup directory,  PowerShell registry.

C2: 146.70.53.146
Dropper: <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://www.virustotal.com/gui/file/bb71d77ff7c7be3dc6957b08e57323092a43735df818b3150c41b8230c4d9be1/details">virustotal.com/gui/file/bb71d…</a>

Backdoor: <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://www.virustotal.com/gui/file/db9dd6afce8addf2e6b61ab3a3ce9424168691b0f5dda4ce68dcbc4a79311101/details">virustotal.com/gui/file/db9dd…</a>

@JAMESWT_MHT
SquiblydooBlog's tweet image. #SolarMarker pretending to be a chrome update. 
#Signed "Game Warriors Limited"

<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://tria.ge/220926-xqpq8schej/behavioral2">tria.ge/220926-xqpq8sc…</a>
Back to PowerShell, file in the startup directory,  PowerShell registry.

C2: 146.70.53.146
Dropper: <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://www.virustotal.com/gui/file/bb71d77ff7c7be3dc6957b08e57323092a43735df818b3150c41b8230c4d9be1/details">virustotal.com/gui/file/bb71d…</a>

Backdoor: <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://www.virustotal.com/gui/file/db9dd6afce8addf2e6b61ab3a3ce9424168691b0f5dda4ce68dcbc4a79311101/details">virustotal.com/gui/file/db9dd…</a>

@JAMESWT_MHT


I like this idea. Are there a lot of cases in the industry that would require ads to be shown for an internal network?


Nice share and a timely reminder on why ad blocking and extension handling should not be ignored at an enterprise level..

Microsoft researchers are tracking an ongoing wide-ranging click fraud campaign where attackers monetize clicks generated by a browser node-webkit or malicious browser extension secretly installed on devices. Microsoft attributes the attack to a threat actor tracked as DEV-0796.

MsftSecIntel's tweet image. Microsoft researchers are tracking an ongoing wide-ranging click fraud campaign where attackers monetize clicks generated by a browser node-webkit or malicious browser extension secretly installed on devices. Microsoft attributes the attack to a threat actor tracked as DEV-0796.


Firefox? FIREFOX IN THE WILD? I approve


I'm not familiar with this... Hroup Policy you speak of. 🙃


Any safety concerns about using this extension in the work place? Have considered it but it doesn't seem to be in common usage in the enterprise


Really want to get this going but the impending Manifest v3 API changes, which seem targeted around breaking ad-blocking, make me wonder if a network based approach would have more longevity


Pi-hole? I guess it wouldn’t be browser tho, as it’s network level blocking


Just deployed uBlock Origin via GPO at one of my clients with all of their internal and line if business websites added to trusted sites. I wish adding things to trusted sites wasnt so unbelievably jank. Registry keys is jank enough, but a json oneliner?


Great thread but I'm slow to put time into implementing this with Manifest v3 coming down the tracks and the uncertainty as to whether or not uBlock will continue to work with that.


Enable native tracking protection in Edge and Firefox docs.microsoft.com/en-us/microsof…


此推文已無法使用。
United States 趨勢
Loading...

Something went wrong.


Something went wrong.