Challenge: How to deploy browser adblocking company-wide without possibly hitting our own global properties, internal sites, or getting noticed by marketing? Push a uBlock Origin policy with Hroup Policy including a RegEx that disables it on domains with our company name.

SwiftOnSecurity's tweet image. Challenge: How to deploy browser adblocking company-wide without possibly hitting our own global properties, internal sites, or getting noticed by marketing?
Push a uBlock Origin policy with Hroup Policy including a RegEx that disables it on domains with our company name.

Adblocking is hyper-effective at quenching network threat alarms, massively reducing proxy log volume during threat investigations, and stopping users redirected to phishing and malware. Current corporate uBlock Origin configuration. I may move us to AdGuard instead of EasyList.

SwiftOnSecurity's tweet image. Adblocking is hyper-effective at quenching network threat alarms, massively reducing proxy log volume during threat investigations, and stopping users redirected to phishing and malware.
Current corporate uBlock Origin configuration. I may move us to AdGuard instead of EasyList.

Yes I'm writing a blog on How We Do Browsers from top to bottom, but I use Twitter because I'm too impatient. I've been doing this for many many years and have even given feedback/bugs to the Chrome, Edge, and Firefox teams.


AS I WAS SAYING. If you have MDE/ATP and your SOC is getting deluged with alerts recently, it's because you don't have adblocking deployed to those machines yet. Adblocking STOPS THE BEGINNING OF THE ATTACK FROM EXISTING.

Microsoft researchers are tracking an ongoing wide-ranging click fraud campaign where attackers monetize clicks generated by a browser node-webkit or malicious browser extension secretly installed on devices. Microsoft attributes the attack to a threat actor tracked as DEV-0796.

MsftSecIntel's tweet image. Microsoft researchers are tracking an ongoing wide-ranging click fraud campaign where attackers monetize clicks generated by a browser node-webkit or malicious browser extension secretly installed on devices. Microsoft attributes the attack to a threat actor tracked as DEV-0796.


I don't just make this shit up you know like I'm a human person with experiences and feelings.


Your users are getting these malicious advertising redirects and workflow captures, browsing local news sites. All the time.

#SolarMarker pretending to be a chrome update. #Signed "Game Warriors Limited" tria.ge/220926-xqpq8sc… Back to PowerShell, file in the startup directory, PowerShell registry. C2: 146.70.53.146 Dropper: virustotal.com/gui/file/bb71d… Backdoor: virustotal.com/gui/file/db9dd… @JAMESWT_MHT

SquiblydooBlog's tweet image. #SolarMarker pretending to be a chrome update. 
#Signed "Game Warriors Limited"

<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://tria.ge/220926-xqpq8schej/behavioral2">tria.ge/220926-xqpq8sc…</a>
Back to PowerShell, file in the startup directory,  PowerShell registry.

C2: 146.70.53.146
Dropper: <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://www.virustotal.com/gui/file/bb71d77ff7c7be3dc6957b08e57323092a43735df818b3150c41b8230c4d9be1/details">virustotal.com/gui/file/bb71d…</a>

Backdoor: <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://www.virustotal.com/gui/file/db9dd6afce8addf2e6b61ab3a3ce9424168691b0f5dda4ce68dcbc4a79311101/details">virustotal.com/gui/file/db9dd…</a>

@JAMESWT_MHT
SquiblydooBlog's tweet image. #SolarMarker pretending to be a chrome update. 
#Signed "Game Warriors Limited"

<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://tria.ge/220926-xqpq8schej/behavioral2">tria.ge/220926-xqpq8sc…</a>
Back to PowerShell, file in the startup directory,  PowerShell registry.

C2: 146.70.53.146
Dropper: <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://www.virustotal.com/gui/file/bb71d77ff7c7be3dc6957b08e57323092a43735df818b3150c41b8230c4d9be1/details">virustotal.com/gui/file/bb71d…</a>

Backdoor: <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://www.virustotal.com/gui/file/db9dd6afce8addf2e6b61ab3a3ce9424168691b0f5dda4ce68dcbc4a79311101/details">virustotal.com/gui/file/db9dd…</a>

@JAMESWT_MHT


How are you handling news sites etc that require ads to work? I assume you get a lot of tickets at first?


Ublock origin allows you to disable it per site


Thank you for sharing this.


can I ask what are you planning with the new manifest v3 changes knowing UBO may change significantly?


Can't wait for the post


Seems like a targeted actor could use a domain containing the victims company name as part of the url?


United States Trends
Loading...

Something went wrong.


Something went wrong.