_matt_kennedy's profile picture. Manager at Microsoft Threat Intelligence Center. Adjunct Faculty at Georgetown University. Penn State Alum. Tweets are my own.

Matthew Kennedy

@_matt_kennedy

Manager at Microsoft Threat Intelligence Center. Adjunct Faculty at Georgetown University. Penn State Alum. Tweets are my own.

Matthew Kennedy reposted

Today, Microsoft Threat Intelligence Center (#MSTIC) is excited to announce the release of #RIFT, a tool designed to assist software/malware analysts automate the identification of attacker-written code within Rust binaries. Blog: microsoft.com/en-us/security… Tool:…

This post is unavailable.

Matthew Kennedy reposted

At @CYBERWARCON, Microsoft is sharing research on North Korean threat actors who steal cryptocurrency and target satellite & weapons systems orgs, as well as details on intelligence collection operations by Chinese threat actor Storm-2077. Learn more: msft.it/6016Wvv28


One of the most fascinating aspects of following DPRK threat actors is observing leading indicators from numerous intrusion sets target the same technologies months before an announcement.


Matthew Kennedy reposted

Mandatory multi-factor auth for all of these services is going to make things significantly harder for threat actors to conduct intrusions. This will raise the resource cost significantly – and reduce success rate – for malicious infrastructure & service abuse in Azure.…

🚨 Mandatory multi-factor authentication • MFA Phase 1 (Oct 2024): Azure portal, Entra admin center, and Intune admin center. • MFA Phase 2 (early 2025): gradual enforcement for Azure CLI, Azure PowerShell, Azure mobile app, and Infrastructure as Code (IaC) tools 📩…



Matthew Kennedy reposted

We out here! Come find us!

KC7cyber's tweet image. We out here! Come find us!

Matthew Kennedy reposted

🧵on the ongoing outage caused by Crowdstrike content update. Insights here mostly based on my time working on/helping build a competitor product Mandiant Intelligent Response\HX First & foremost this sucks for both Crowdstrike & their customers - no one wants to see this happen


It's not every day you get to lead in defining a new DPRK threat actor. A big congrats to the team that worked on this! "Moonstone Sleet’s diverse set of tactics is notable... because of how they have evolved from those of several other North Korean threat actors over many years"

Microsoft has identified a new North Korean threat actor, Moonstone Sleet (Storm-1789), that combines many tried-and-true techniques used by other North Korean threat actors with unique attack methodologies for financial and cyberespionage objectives. msft.it/6017Ygsud



Matthew Kennedy reposted

Microsoft has identified a new North Korean threat actor, Moonstone Sleet (Storm-1789), that combines many tried-and-true techniques used by other North Korean threat actors with unique attack methodologies for financial and cyberespionage objectives. msft.it/6017Ygsud


Matthew Kennedy reposted

New piece on TA427 (overlaps with Emerald Sleet, APT43, the K-word) 🇰🇵🇰🇵 Lots of benign email conversations to gather strategic information from NGOs, think tanks, and academics in the DPRK research space 📧📮 DMARC, typosquats, and solicitation oh my! proofpoint.com/us/blog/threat…


Matthew Kennedy reposted

Pfizer's Cyber Threat Analysis and Response team is hiring a Cyber Intrusion Analyst ! Come join a team of curious and passionate defenders with a critical mission. This is a hybrid role based in the Philadelphia area. pfizer.wd1.myworkdayjobs.com/PfizerCareers/…


Matthew Kennedy reposted

MSTIC is looking for a cleared Senior Threat Intelligence Analyst in Australia (CBR). This is an exciting opportunity to make a tangible difference in combating Nation State, ransomware threats, and more. Day to day you'll be working with peers around the world tracking and…


Matthew Kennedy reposted

MSTIC is looking for Senior Security Researchers (Malware Reverse Engineers) in the US and Australia to join our MSTIC-RE team. This is an exciting opportunity to make a tangible difference in combating Nation State (NS/APT/DHA) and ransomware threats. jobs.careers.microsoft.com/global/en/job/…


Matthew Kennedy reposted

Listen to Microsoft Threat Intelligence analysts @Greg_Schloemer & @_matt_kennedy discuss with @sherrod_im what makes the North Korean threat landscape unique, and how actors persistently abuse chains of trust to generate revenue for the regime: msft.it/6019i0kBF


This was a blast! Loved chatting all things North Korea cyber operations with @sherrod_im and @Greg_Schloemer!

THE Microsoft Threat Intelligence podcast. 🇰🇵Special request DPRK episode! 🇰🇵 Greg and Matthew discuss North Korean cyber operations, highlighting the unique aspects that set North Korea apart, emphasizing North Korea's persistence and adaptability.🫡 podcasts.apple.com/us/podcast/mic…



Loading...

Something went wrong.


Something went wrong.