_watcher7's profile picture. Christian | Head of Rebel Intelligence | Stoop Kid | Security Analyst County Government, TX | watcher

derek

@_watcher7

Christian | Head of Rebel Intelligence | Stoop Kid | Security Analyst County Government, TX | watcher

Defenders, don't forget: you can dictate the field of battle in your network. Force the adversary to use tools uncomfortable to them. Impost cost by knowing your environment better than they can. Just stoked we finally got NetFlow being ingested to Cribl 😤


Brb, joining a cybergang on the off chance they extort the wrong Company and I can turn them in for an easy $20m

"...harshest penalties possible and will not pay the $20 million ransom demand we received. Instead we are establishing a $20 million reward fund for information leading to the arrest and conviction of the criminals responsible for this attack." 😤 coinbase.com/blog/protectin…



Got my first @sansforensics class books in the mail! Anyone have some tips other than copious amounts of black Folgers coffee?

_watcher7's tweet image. Got my first @sansforensics class books in the mail! Anyone have some tips other than copious amounts of black Folgers coffee?

derek أعاد

I am happy to share a new resource I recently created called The Ransomware Tool Matrix: 🔗 blog.bushidotoken.net/2024/08/the-ra… #CTI #ThreatHunting #ThreatIntel #Ransomware

BushidoToken's tweet image. I am happy to share a new resource I recently created called The Ransomware Tool Matrix: 

🔗 blog.bushidotoken.net/2024/08/the-ra…

#CTI #ThreatHunting #ThreatIntel #Ransomware

Also seeing the domain consectetur[.]xyz associated with this activity as well. Using the 9cantronnfit[.]com WebSocket C2 domain mentioned in the report

Hello everyone, today, we present our team's findings on the phishing campaign behind the recent incident: any.run/cybersecurity-… - 72 Phishing Domains: Pretending to be real companies - Advanced Techniques: Including direct human interaction - Fake Websites:…



derek أعاد

operation endgame taps into the raw emotions of those with skin in the cyber crime [cat & mouse] game. love the layers & the signaling in the video. on upcoming reveals: “It sure will be exciting. Maybe not for everyone though. Some results can be found here, others will come to…


I've acquired the bank Routing and Account number being used by a threat actor. Who, if anyone, do I report that information to? Can't tell if FTC, local FBI, or maybe bank. I'm reaching out to the compromised vendor as well


"Top 10 Most Frequently Seen Techniques" - are these techniques widely used or is there a broader understanding in detecting these activities over others


derek أعاد

This is pretty much why opsec is much needed in cyber operations. Cyberwar is war.

CLEARED FOR RELEASE: We thwarted an attempted Hamas cyber offensive against Israeli targets. Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. HamasCyberHQ.exe has been removed.

IDF's tweet image. CLEARED FOR RELEASE: We thwarted an attempted Hamas cyber offensive against Israeli targets. Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. 

HamasCyberHQ.exe has been removed.


Loading...

Something went wrong.


Something went wrong.