sarah__yoder's profile picture. Incident Response @Mandiant. Former MITRE ATT&CKer.

Sarah Yoder

@sarah__yoder

Incident Response @Mandiant. Former MITRE ATT&CKer.

Earlier this year, I worked one the most interesting and complex IRs of my career. The malware and techniques from that case turned out to be key TTPs observed in multiple subsequent UNC5221 cases! cloud.google.com/blog/topics/th…


Repost di Sarah Yoder

🔥new blog detailing 0day exploitation of Ivanti appliances as well as newly observed malware families tracked as PHASEJAM and DRYHOOK. We also detail activity related to the previously observed SPAWN malware ecosystem tied to China nexus cluster UNC5337. cloud.google.com/blog/topics/th…


Repost di Sarah Yoder

Today, @Mandiant published #MTrends2024, the 15th edition of the report. This report has everything - Frontline Intel Metrics, Hot Zero-Day Summer, Attackers Living on the Edge, insights into☁Threats, evolution of 🎣... Get your copy here: cloud.google.com/security/resou…


Repost di Sarah Yoder

it's always dns and/or caching until you're behind a corporate ssl inspection appliance. then it's always ssl certificates.


Check out @Mandiant’s latest hardening and remediation guide for orgs impacted by the recent ConnectWise #ScreenConnect vulns (CVE-2024-1708 and CVE-2024-1709) mandiant.com/resources/blog…


Repost di Sarah Yoder

LockBit ransomware gang disrupted by global operation dlvr.it/T2zG6G


Every single known Lockbit ransomware group website is either offline or displaying a seized by EUROPOL page. It appears law enforcement has seized and/or taken down, at minimum, 22 Tor sites, in what is labeled 'Operation Cronos'.

vxunderground's tweet image. Every single known Lockbit ransomware group website is either offline or displaying a seized by EUROPOL page.

It appears law enforcement has seized and/or taken down, at minimum, 22 Tor sites, in what is labeled 'Operation Cronos'.
vxunderground's tweet image. Every single known Lockbit ransomware group website is either offline or displaying a seized by EUROPOL page.

It appears law enforcement has seized and/or taken down, at minimum, 22 Tor sites, in what is labeled 'Operation Cronos'.


Repost di Sarah Yoder

Lockbit when they're compromised

vxunderground's tweet image. Lockbit when they're compromised

Repost di Sarah Yoder

🔥new @Mandiant blog off the press digging further into our findings from Ivanti CS exploitation. Part 2 covers some new malware families, more on ZIPLINE, updates to attribution, and a bit on mitigation bypassing and new post-ex TTPs. mandiant.com/resources/blog…


Repost di Sarah Yoder

UNC4990 - The first malicious threat actor Mandiant has tracked that's based out of Italy - employs some tactics we haven't seen before. mandiant.com/resources/blog…

Mgkarayan's tweet image. UNC4990 - The first malicious threat actor Mandiant has tracked that's based out of Italy - employs some  tactics we haven't seen before. 
mandiant.com/resources/blog…

Repost di Sarah Yoder

.@Volexity shares new observations on cont'd widespread exploitation of Ivanti Connect Secure VPN vulnerabilities. Now, 2100+ compromised devices & UTA0178 observed modifying built-in Integrity Checker Tool to evade detection. Details: volexity.com/blog/2024/01/1… #dfir #threatintel


Every single known Lockbit ransomware group website is either offline or displaying a seized by EUROPOL page. It appears law enforcement has seized and/or taken down, at minimum, 22 Tor sites, in what is labeled 'Operation Cronos'.

vxunderground's tweet image. Every single known Lockbit ransomware group website is either offline or displaying a seized by EUROPOL page.

It appears law enforcement has seized and/or taken down, at minimum, 22 Tor sites, in what is labeled 'Operation Cronos'.
vxunderground's tweet image. Every single known Lockbit ransomware group website is either offline or displaying a seized by EUROPOL page.

It appears law enforcement has seized and/or taken down, at minimum, 22 Tor sites, in what is labeled 'Operation Cronos'.


Repost di Sarah Yoder

The financially motivated threat actor tracked by Microsoft as Octo Tempest, whose evolving campaigns leverage tradecraft not seen in typical threat models, represents a growing concern for organizations. Get TTPs and protection info: msft.it/60129Lhkw


Repost di Sarah Yoder

🚨 NetScaler vulnerability CVE-2023-4966 is being actively exploited. It can lead to VDI session hijacking, including MFA bypass. There are no logs on the appliance to monitor for exploitation. Upgrade now and investigate your environment! mandiant.com/resources/blog… #DFIR


Repost di Sarah Yoder

Our blog on UNC3944, a threat actor involved in several recent attacks on the hospitality sector and other industries. Includes actor methods and mitigations. mandiant.com/resources/blog…


Repost di Sarah Yoder

🎯#Qakbot Botnet Takedown in Operation Duck Hunt! 💻 700,000 Victim Computers 💰 $8.6m in cryptocurrency seized by DOJ 💰 Qakbot has earned $58m in ransoms 🔒 Qakbot used by Conti, ProLock, Egregor, REvil, MegaCortex, and Black Basta ransomware groups justice.gov/usao-cdca/pr/q…


Repost di Sarah Yoder

Today we launched a 🔎 scanning tool for orgs to search their Citrix netscalers for evidence of CVE-2023-3519 post-exploration. You can run this direct on the ADC or against a forensic image. With public POCs out there expect more exploitation! mandiant.com/resources/blog… #DFIR


Loading...

Something went wrong.


Something went wrong.