usrclass's profile picture. DFIR Stuff

Aaron

@usrclass

DFIR Stuff

Aaron reposted

🧵We are excited to share that @Zeekurity is now a component of @Microsoft @Windows ! An incredible development that truly establishes Zeek as the de facto standard for #networkevidence: corelight.com/company/zeek-n… 1/4


Aaron reposted

Blog: A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion by William Backhouse ( @Will0x04 ), Michael Mullen ( @DropTheBase64 ) and Nikolaos Pantazopoulos research.nccgroup.com/2022/09/30/a-g…

NCCGroupInfosec's tweet image. Blog: A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion by William Backhouse ( @Will0x04 ), Michael Mullen ( @DropTheBase64 ) and Nikolaos Pantazopoulos research.nccgroup.com/2022/09/30/a-g…

Aaron reposted

In case you missed it at #BHUSA, check out @tr1ana's Monkey365, a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Azure Active Directory security configuration reviews research.nccgroup.com/2022/09/07/too…


Aaron reposted

Blog: Back in Black: Unlocking a LockBit 3.0 Ransomware Attack - explores some of the TTPs employed by a threat actor who were observed deploying LockBit 3.0 ransomware during an incident response engagement - by @rdi_x64 - research.nccgroup.com/2022/08/19/bac…

NCCGroupInfosec's tweet image. Blog: Back in Black: Unlocking a LockBit 3.0 Ransomware Attack - explores some of the TTPs employed by a threat actor who were observed deploying LockBit 3.0 ransomware during an incident response engagement - by @rdi_x64 - research.nccgroup.com/2022/08/19/bac…

Aaron reposted

Blog: Top of the Pops - Three common ransomware entry techniques by @MMatthews32

NCCGroupInfosec's tweet image. Blog: Top of the Pops - Three common ransomware entry techniques by @MMatthews32

Aaron reposted

Blog: Climbing Mount Everest: Black-Byte Bytes Back? - research.nccgroup.com/2022/07/13/cli… by Michael Mullen and Nikolaos Pantazopoulos

NCCGroupInfosec's tweet image. Blog: Climbing Mount Everest: Black-Byte Bytes Back? - research.nccgroup.com/2022/07/13/cli… by Michael Mullen and Nikolaos Pantazopoulos

Aaron reposted

Are you using any of the Microsoft Security products and/or #Sentinel? Then this thread is for you! The best resources for #KQL Advanced Hunting Queries or Analytics rules in my opinion. #MDE #ThreatHunting #Detection #DFIR


Aaron reposted

Blog: Metastealer - filling the Racoon void - research.nccgroup.com/2022/05/20/met… by by Peter Gurney

NCCGroupInfosec's tweet image. Blog: Metastealer - filling the Racoon void - research.nccgroup.com/2022/05/20/met… by by Peter Gurney

Aaron reposted

Blog: North Korea’s Lazarus - their initial access trade-craft using social media and social engineering by @MMatthews32 and Nikolaos Pantazopoulos - research.nccgroup.com/2022/05/05/nor…

NCCGroupInfosec's tweet image. Blog: North Korea’s Lazarus - their initial access trade-craft using social media and social engineering by @MMatthews32 and Nikolaos Pantazopoulos - research.nccgroup.com/2022/05/05/nor…

Aaron reposted

Blog: LAPSUS$ - Recent techniques, tactics and procedures - research.nccgroup.com/2022/04/28/lap… - by @davidbrown1982 @MMatthews32 and @_bobbysmalls

NCCGroupInfosec's tweet image. Blog: LAPSUS$ - Recent techniques, tactics and procedures - research.nccgroup.com/2022/04/28/lap… - by @davidbrown1982 @MMatthews32 and @_bobbysmalls

Aaron reposted

Blog: Adventures in the land of BumbleBee – a new malicious loader - research.nccgroup.com/2022/04/29/adv… by @Mike_stokkel, Nikolaos Totosis and Nikolaos Pantazopoulos

NCCGroupInfosec's tweet image. Blog: Adventures in the land of BumbleBee – a new malicious loader - research.nccgroup.com/2022/04/29/adv… by @Mike_stokkel, Nikolaos Totosis and Nikolaos Pantazopoulos

Great effort by the team who have been working hard on this one. The detection mentioned is well worth monitoring for.

Blog: Detecting Karakurt – an extortion focused threat actor by NCC Group's Cyber Incident Response Team members - Simon Biggs, Richard Footman and Michael Mullen - research.nccgroup.com/2022/02/17/det… #Karakurt

NCCGroupInfosec's tweet image. Blog: Detecting Karakurt – an extortion focused threat actor by NCC Group's Cyber Incident Response Team members - Simon Biggs, Richard Footman and Michael Mullen - 
research.nccgroup.com/2022/02/17/det… #Karakurt


Aaron reposted

Blog: Log4Shell: Reconnaissance and post exploitation network detection - includes numerous @Suricata_IDS rules and IoCs - research.nccgroup.com/2021/12/12/log…


Aaron reposted

Blog: Tracking a P2P network related to #TA505 - we've identified a new peer2peer implant capability we attribute to the authors of Grace - research.nccgroup.com/2021/12/01/tra…


Aaron reposted

TA505 exploits SolarWinds Serv-U vulnerability (CVE-2021-35211) for initial access research.nccgroup.com/2021/11/08/ta5…


Aaron reposted

Analysis and reporting completed by @kostastsale Reviewed by @iiamaleks and @pigerlin 📢Shout-outs to @TheRecord_Media, @BHinfoSecurity, @malware_traffic, @NCCGroupInfosec, @redcanary, & @AltShiftPrtScn


Aaron reposted

BazarLoader and the Conti Leaks Discovery: AdFind, Advanced IP Scanner, PowerSploit, Nltest, Net, etc. Credential Access: ntdsAudit, ntdsutil, LSASS Access Defense Evasion: Process Injection C2: #CobaltStrike, AnyDesk Exfil: Rclone (upload to mega) thedfirreport.com/2021/10/04/baz…

TheDFIRReport's tweet image. BazarLoader and the Conti Leaks

Discovery:  AdFind, Advanced IP Scanner, PowerSploit, Nltest, Net, etc. 
Credential Access: ntdsAudit, ntdsutil, LSASS Access
Defense Evasion: Process Injection
C2: #CobaltStrike, AnyDesk
Exfil: Rclone (upload to mega) 

thedfirreport.com/2021/10/04/baz…
TheDFIRReport's tweet image. BazarLoader and the Conti Leaks

Discovery:  AdFind, Advanced IP Scanner, PowerSploit, Nltest, Net, etc. 
Credential Access: ntdsAudit, ntdsutil, LSASS Access
Defense Evasion: Process Injection
C2: #CobaltStrike, AnyDesk
Exfil: Rclone (upload to mega) 

thedfirreport.com/2021/10/04/baz…
TheDFIRReport's tweet image. BazarLoader and the Conti Leaks

Discovery:  AdFind, Advanced IP Scanner, PowerSploit, Nltest, Net, etc. 
Credential Access: ntdsAudit, ntdsutil, LSASS Access
Defense Evasion: Process Injection
C2: #CobaltStrike, AnyDesk
Exfil: Rclone (upload to mega) 

thedfirreport.com/2021/10/04/baz…
TheDFIRReport's tweet image. BazarLoader and the Conti Leaks

Discovery:  AdFind, Advanced IP Scanner, PowerSploit, Nltest, Net, etc. 
Credential Access: ntdsAudit, ntdsutil, LSASS Access
Defense Evasion: Process Injection
C2: #CobaltStrike, AnyDesk
Exfil: Rclone (upload to mega) 

thedfirreport.com/2021/10/04/baz…

Excited to tuck into this @sansforensics course next week.

usrclass's tweet image. Excited to tuck into this @sansforensics course next week.

Loading...

Something went wrong.


Something went wrong.