lazy_daemon's profile picture. Interested in CTI/Malware Analysis/RE, DFIR and windows exploitation. I like video games & tech as well 🙂. CTI @ Deutsche Telekom Security. Tweets are my own.

Robert Giczewski

@lazy_daemon

Interested in CTI/Malware Analysis/RE, DFIR and windows exploitation. I like video games & tech as well 🙂. CTI @ Deutsche Telekom Security. Tweets are my own.

Robert Giczewski أعاد

🚨 ALERT: Cybercriminals are sending out fake Telekom invoices via phishing emails to deliver multiple malicious RAT payloads. The activity originates from an attack cluster tracked by Telekom Security under the name "Rodent Weed". 🧵1/6

DTCERT's tweet image. 🚨 ALERT: Cybercriminals are sending out fake Telekom invoices via phishing emails to deliver multiple malicious RAT payloads. The activity originates from an attack cluster tracked by Telekom Security under the name "Rodent Weed". 🧵1/6

Robert Giczewski أعاد

Some folks took my post as “detection > TI” or assumed I believe TI is just IOCs. Let’s clarify. I wrote that post after being called a threat intel company four times this month. We’re not. We do detection engineering - and yes, that often integrates TI, but it produces a…

cyb3rops's tweet image. Some folks took my post as “detection > TI” or assumed I believe TI is just IOCs.
Let’s clarify.

I wrote that post after being called a threat intel company four times this month.
We’re not.
We do detection engineering - and yes, that often integrates TI, but it produces a…

Threat intel analysts produce threat intelligence. Detection engineers produce detection intelligence. Big difference. Gartner doesn’t list the second one yet. TI is about indicators tied to a known threat. DI is about rules that catch malicious behavior across threats. One…



Robert Giczewski أعاد

Reading Microsoft’s new Void Blizzard report, one thing stands out (again): Everything is about credential theft, phishing, and tokens. Initial access comes from buying or stealing creds - often through low-effort phishing. All the real action happens in the cloud, not on…

cyb3rops's tweet image. Reading Microsoft’s new Void Blizzard report, one thing stands out (again): Everything is about credential theft, phishing, and tokens. Initial access comes from buying or stealing creds - often through low-effort phishing. All the real action happens in the cloud, not on…
cyb3rops's tweet image. Reading Microsoft’s new Void Blizzard report, one thing stands out (again): Everything is about credential theft, phishing, and tokens. Initial access comes from buying or stealing creds - often through low-effort phishing. All the real action happens in the cloud, not on…

Microsoft has discovered worldwide cloud abuse activity by new Russia-affiliated threat actor Void Blizzard (LAUNDRY BEAR), whose cyberespionage activity targets gov't, defense, transportation, media, NGO, and healthcare in Europe and North America. msft.it/6011S9JpN



Robert Giczewski أعاد

Fraudsters have now started using EPC QR codes in fake invoices that can be opened by many banking apps. These codes already contain all the necessary transfer information for the app to start a simple transfer action for the victim. (1/3)

DTCERT's tweet image. Fraudsters have now started using EPC QR codes in fake invoices that can be opened by many banking apps. These codes already contain all the necessary transfer information for the app to start a simple transfer action for the victim. (1/3)

Robert Giczewski أعاد

This is a great summary. We (and by we I mean mostly @willoram) have been using variants of this diagram to describe the inversion of attack paths to identity-based intrusions - a major trend in our incident response cases over the past year.

smoothimpact's tweet image. This is a great summary. We (and by we I mean mostly @willoram) have been using variants of this diagram to describe the inversion of attack paths to identity-based intrusions - a major trend in our incident response cases over the past year.

In the past, you had to: phish a user, drop malware, escalate privileges, pivot to servers, evade EDR, dump creds, move laterally, exfiltrate quietly, clean up, leave a backdoor. Today, you just: phish a user, steal an OAuth token, access everything from anywhere. Cloud…



Robert Giczewski أعاد

Microsoft Threat Intelligence observed a new and notable method used by the threat actor Storm-0249 for distributing the Latrodectus trojan, a malware loader designed to facilitate multi-stage attacks by downloading and installing additional payloads onto compromised devices.

MsftSecIntel's tweet image. Microsoft Threat Intelligence observed a new and notable method used by the threat actor Storm-0249 for distributing the Latrodectus trojan, a malware loader designed to facilitate multi-stage attacks by downloading and installing additional payloads onto compromised devices.

Robert Giczewski أعاد

🚨 Telekom Security detected a major #vishing campaign against multiple targets in #Germany, likely related to a ransomware group. We are still analyzing, but here is what we know so far 🧵1/x

DTCERT's tweet image. 🚨 Telekom Security detected a major #vishing campaign against multiple targets in #Germany, likely related to a ransomware group. We are still analyzing, but here is what we know so far 🧵1/x

Robert Giczewski أعاد

I interviewed 57 security leaders to answer one question: What sucks in security right now? The answers were fascinating, frustrating, and occasionally funny 🧵


Robert Giczewski أعاد

At this year's #DEATHCon I was fortunate enough to present my workshop on #Kusto graph semantics. Now I release it for free to everybody. #KQL #Security #Kraph cloudbrothers.info/en/workshop-ku…


Robert Giczewski أعاد

We have also detected this campaign. It starts with an email 📧 containing an SVG file which, when opened, drops an HTML file. The HTML file displays a spoofed PDF file and tricks the victim into clicking the "Open" button 🧵1/4

DTCERT's tweet image. We have also detected this campaign. It starts with an email 📧 containing an SVG file which, when opened, drops an HTML file.
The HTML file displays a spoofed PDF file and tricks the victim into clicking the "Open" button 🧵1/4

WsgiDAV opendir: https://german-multiple-reunion-foundation.trycloudflare[.]com/

malwrhunterteam's tweet image. WsgiDAV opendir: https://german-multiple-reunion-foundation.trycloudflare[.]com/


Robert Giczewski أعاد

Had fun presenting #WARMCOOKIE research at #VB2024. The malware was recently updated with new handlers. Our team wrote some tooling to simulate the C2 server to help organizations build better detections. Tooling: github.com/elastic/labs-r…


Robert Giczewski أعاد

🚨🔥 LOLRMM IS LIVE! 🔥🚨 The wait is over, folks! 🥳🎉 We’re thrilled to announce the official release of LOLRMM — your new go-to tool to detect and counter RMM abuse! 🕵️‍♂️💻 👉 Check it out NOW at LOLRMM.io 👈 This couldn’t have been possible without our amazing…


Robert Giczewski أعاد

What's new in IDA 9.0? youtu.be/c9ehQfLY-d4 - No more IDA 32 - IDA as a library (for C++ and Python headless development) - New and updated signatures (for FLIRT) - Legacy 'structs' and 'enums' windows and APIs are gone - Plugin binaries not compatible with 9.0; need to…

allthingsida's tweet card. What's new in IDA 9.0?

youtube.com

YouTube

What's new in IDA 9.0?


Robert Giczewski أعاد

Bellingcat’s Online Open Source Investigation Toolkit bellingcat.gitbook[.]io/toolkit

blackorbird's tweet image. Bellingcat’s Online Open Source Investigation Toolkit
bellingcat.gitbook[.]io/toolkit

Robert Giczewski أعاد

#Latrodectus Infection lead to #BruteRatel🕷️🦫 #MalwareAnalysis & #TTPs Several unpacking routine (VirtualAlloc & VirtualProtect) lead to 2 DLLs [+] Rundll32.exe T1218.011 Internal name: badger_x64_stealth_rtl.bin.packed.dll Export Func: DllMain StartW unpac.me/results/fe22fa…

Max_Mal_'s tweet image. #Latrodectus Infection lead to #BruteRatel🕷️🦫

#MalwareAnalysis & #TTPs
Several unpacking routine (VirtualAlloc & VirtualProtect) lead to 2 DLLs

[+] Rundll32.exe T1218.011
Internal name: badger_x64_stealth_rtl.bin.packed.dll
Export Func: DllMain StartW

unpac.me/results/fe22fa…
Max_Mal_'s tweet image. #Latrodectus Infection lead to #BruteRatel🕷️🦫

#MalwareAnalysis & #TTPs
Several unpacking routine (VirtualAlloc & VirtualProtect) lead to 2 DLLs

[+] Rundll32.exe T1218.011
Internal name: badger_x64_stealth_rtl.bin.packed.dll
Export Func: DllMain StartW

unpac.me/results/fe22fa…
Max_Mal_'s tweet image. #Latrodectus Infection lead to #BruteRatel🕷️🦫

#MalwareAnalysis & #TTPs
Several unpacking routine (VirtualAlloc & VirtualProtect) lead to 2 DLLs

[+] Rundll32.exe T1218.011
Internal name: badger_x64_stealth_rtl.bin.packed.dll
Export Func: DllMain StartW

unpac.me/results/fe22fa…

#Latrodectus - #BruteRatel - .pdf > url > .js > .msi > .dll 18.09.2024 👇 wscript.exe Document-21-29-08.js msiexec.exe /V MSI152A.tmp /DontWait rundll32.exe C:\Users\Admin\AppData\Roaming\x64_stealth.dll, clBuildProgram (1/3) 👇 IOC's github.com/pr0xylife/Latr…

Cryptolaemus1's tweet image. #Latrodectus - #BruteRatel - .pdf > url > .js > .msi > .dll

18.09.2024 👇

wscript.exe Document-21-29-08.js

msiexec.exe /V

MSI152A.tmp /DontWait

rundll32.exe C:\Users\Admin\AppData\Roaming\x64_stealth.dll, clBuildProgram

(1/3) 👇

IOC's
github.com/pr0xylife/Latr…


Robert Giczewski أعاد

#Latrodectus - #BruteRatel - .pdf > url > .js > .msi > .dll 18.09.2024 👇 wscript.exe Document-21-29-08.js msiexec.exe /V MSI152A.tmp /DontWait rundll32.exe C:\Users\Admin\AppData\Roaming\x64_stealth.dll, clBuildProgram (1/3) 👇 IOC's github.com/pr0xylife/Latr…

Cryptolaemus1's tweet image. #Latrodectus - #BruteRatel - .pdf > url > .js > .msi > .dll

18.09.2024 👇

wscript.exe Document-21-29-08.js

msiexec.exe /V

MSI152A.tmp /DontWait

rundll32.exe C:\Users\Admin\AppData\Roaming\x64_stealth.dll, clBuildProgram

(1/3) 👇

IOC's
github.com/pr0xylife/Latr…

Robert Giczewski أعاد

The people who claimed the ‘EU version of iOS is the most fun version of iOS’ are awful quiet today

sdw's tweet image. The people who claimed the ‘EU version of iOS is the most fun version of iOS’ are awful quiet today

Robert Giczewski أعاد

We joined US & international partners 🇳🇱🇨🇿🇩🇪🇪🇪🇱🇻🇺🇦🇨🇦🇦🇺🇬🇧 to issue a Cybersecurity Advisory on malware used by Russian-state affiliated cyber actors for espionage, theft/leakage of sensitive info & sabotage/data destruction. Read the full advisory here: ic3.gov/Media/News/202…


Robert Giczewski أعاد

#ElasticSecurityLabs is introducing HexForge, our tool that enhances #IDAPro with manipulation capabilities built into the hex and disassembly views. HexForge makes it easy to copy and patch binary data and currently supports RC4, AES, ChaCha20, and XOR: go.es.io/4cTCME2


Loading...

Something went wrong.


Something went wrong.