#elasticsecuritylabs search results

In September, #ElasticSecurityLabs published 78 new rules! Take a look at the overview and learn how we manage these rulesets.

elasticseclabs's tweet image. In September, #ElasticSecurityLabs published 78 new rules! Take a look at the overview and learn how we manage these rulesets.

In July and August, #ElasticSecurityLabs published 113 new rules! Take a look at the overview and learn how we manage these rulesets.

elasticseclabs's tweet image. In July and August, #ElasticSecurityLabs published 113 new rules! Take a look at the overview and learn how we manage these rulesets.

#ElasticSecurityLabs joins forces with @tamusystem and discloses TOLLBOOTH, an IIS module used for SEO abuse that relies on publicly exposed ASP. NET machine keys: go.es.io/3L68p57


#ElasticSecurityLabs saw phishing campaigns deploying LNK files masquerading as PDFs ([.]pdf[.]lnk) to load a Rust-based implant, using Discord C2 via the serenity crate. Bot Token/Server ID were AES-encrypted and Base64-encoded; for our PoC, we used our own.

elasticseclabs's tweet image. #ElasticSecurityLabs saw phishing campaigns deploying LNK files masquerading as PDFs ([.]pdf[.]lnk) to load a Rust-based implant, using Discord C2 via the serenity crate.

Bot Token/Server ID were AES-encrypted and Base64-encoded; for our PoC, we used our own.

#ElasticSecurityLabs is observing #ValleyRAT infections using the following #LOLBins for execution: - DeviceCredentialDeployment.exe (proxy execution) - Tttracer (proxy execution) - Renames curl[.]exe (masquerade) - Ttdinject (remote injection) - Pester (proxy execution)

elasticseclabs's tweet image. #ElasticSecurityLabs is observing #ValleyRAT infections using the following #LOLBins for execution:
- DeviceCredentialDeployment.exe (proxy execution)
- Tttracer (proxy execution)
- Renames curl[.]exe (masquerade)
- Ttdinject (remote injection)
- Pester (proxy execution)

#ElasticSecurityLabs releases nightMARE, a Python-based library for malware analysts that we use to build tools for acquiring intelligence. Read more about it here: go.es.io/46Zt8Ac


#ElasticSecurityLabs gets to the root cause of an Authenticode signature error, reverse-engineering an undocumented Microsoft function in the process. Learn how we solved the problem here: go.es.io/3K2vG7u


#ElasticSecurityLabs has kept tabs on #WARMCOOKIE, a backdoor we disclosed in June 2024 that used employment-related phishing lures to infect victims. Learn how this threat’s evolving: go.es.io/46O8pOo


#ElasticSecurityLabs is monitoring infections deploying #Akira Stealer, a Python stealer rewritten in Golang. Distribution involves packaging a malicious Electron application with the intended application in a .RAR archive. NodeJS Electron App -> Python loader -> Akira Stealer

elasticseclabs's tweet image. #ElasticSecurityLabs is monitoring infections deploying #Akira Stealer, a Python stealer rewritten in Golang. Distribution involves packaging a malicious Electron application with the intended application in a .RAR archive. 

NodeJS Electron App -> Python loader -> Akira Stealer

Greetings from the floor! Devon Kerr here from #ElasticSecurityLabs. We’re in Las Vegas this week at #BHUSA giving you a behind the scenes look at the big show. Stay tuned and come say hi! — DK (@_devonkerr_)

elasticseclabs's tweet image. Greetings from the floor! Devon Kerr here from #ElasticSecurityLabs. We’re in Las Vegas this week at #BHUSA giving you a behind the scenes look at the big show. Stay tuned and come say hi!

— DK (@_devonkerr_)

#ElasticSecurityLabs continues to observe phishing campaigns leveraging Cloudflare tunnels distributing multiple malware families (#VenomRAT, #DCRat, #XWorm) simultaneously. These threat actors are abusing LLMs to produce simple Python shellcode loaders for injection

elasticseclabs's tweet image. #ElasticSecurityLabs continues to observe phishing campaigns leveraging Cloudflare tunnels distributing multiple malware families (#VenomRAT, #DCRat, #XWorm) simultaneously.

These threat actors are abusing LLMs to produce simple Python shellcode loaders for injection

The #ElasticSecurityLabs takeover continues on day 2 at #BHUSA! Come on over to booth 3546 to see Dhrumil in about 10 minutes, he’s breaking down AI for the modern SOC. I will see you there! -DK (@_devonkerr_)

elasticseclabs's tweet image. The #ElasticSecurityLabs takeover continues on day 2 at #BHUSA! Come on over to booth 3546 to see Dhrumil in about 10 minutes, he’s breaking down AI for the modern SOC. I will see you there! 

-DK (@_devonkerr_)

In May, #ElasticSecurityLabs published 52 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/45JHiVR #detectionengineering #SIEM #EDR

elasticseclabs's tweet image. In May, #ElasticSecurityLabs published 52 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/45JHiVR

#detectionengineering #SIEM #EDR

In June, #ElasticSecurityLabs published 13 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/4kOcbfR

elasticseclabs's tweet image. In June, #ElasticSecurityLabs published 13 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/4kOcbfR

Linux syscall hooks were forever changed with kernel 6.9, check out this article from #ElasticSecurityLabs describing #FlipSwitch– the latest in Linux hooking: go.es.io/4nSrCW3


New research on NOVABLIGHT, a NodeJS infostealer sold as MaaS! Discover its tactics, from credential theft & cryptowallet compromise to advanced obfuscation & anti-analysis techniques: go.es.io/459JGDA #ElasticSecurityLabs #infostealer


New research from our #ElasticSecurityLabs team: we dive into how infostealers are leveraging a stolen Shellter evasion tool to deploy data-stealing malware. Learn more & get our unpacker: go.es.io/4ldCM72 #malware #rhadamanthys #ghostpulse


The #ElasticSecurityLabs team is observing exploitation activity targeting on-premise SharePoint servers related to a series of CVEs, which can be chained together, allowing remote code execution. Use these two rules to help identify this activity: go.es.io/4f70FLk


New research from #ElasticSecurityLabs uncovers a new ClickFix campaign! Learn how attackers are using GHOSTPULSE and ARECHCLIENT2 (SECTOPRAT) in multi-stage attacks to deploy RATs and steal data. Stay informed: go.es.io/4l912GO


Ebury is some fascinating and sophisticated malware! Props to @ESETresearch for their extensive threat research report. Happy to see our coverage at @elastic is on point. 🔍👏 #ebury #ElasticSecurityLabs #elastic

RFGroenewoud's tweet image. Ebury is some fascinating and sophisticated malware! Props to @ESETresearch for their extensive threat research report. Happy to see our coverage at @elastic is on point. 🔍👏

#ebury #ElasticSecurityLabs #elastic

#Breaking #ESETresearch releases a paper about Ebury, among the most advanced server-side Linux malware, which was deployed to 400,000 servers over the course of 15 years, primarily for financial gain. @marc_etienne_ welivesecurity.com/en/eset-resear… 1/8



#ElasticSecurityLabs releases nightMARE, a Python-based library for malware analysts that we use to build tools for acquiring intelligence. Read more about it here: go.es.io/46Zt8Ac


#ElasticSecurityLabs joins forces with @tamusystem and discloses TOLLBOOTH, an IIS module used for SEO abuse that relies on publicly exposed ASP. NET machine keys: go.es.io/3L68p57


In September, #ElasticSecurityLabs published 78 new rules! Take a look at the overview and learn how we manage these rulesets.

elasticseclabs's tweet image. In September, #ElasticSecurityLabs published 78 new rules! Take a look at the overview and learn how we manage these rulesets.

#ElasticSecurityLabs has kept tabs on #WARMCOOKIE, a backdoor we disclosed in June 2024 that used employment-related phishing lures to infect victims. Learn how this threat’s evolving: go.es.io/46O8pOo


Linux syscall hooks were forever changed with kernel 6.9, check out this article from #ElasticSecurityLabs describing #FlipSwitch– the latest in Linux hooking: go.es.io/4nSrCW3


In July and August, #ElasticSecurityLabs published 113 new rules! Take a look at the overview and learn how we manage these rulesets.

elasticseclabs's tweet image. In July and August, #ElasticSecurityLabs published 113 new rules! Take a look at the overview and learn how we manage these rulesets.

#ElasticSecurityLabs is observing #ValleyRAT infections using the following #LOLBins for execution: - DeviceCredentialDeployment.exe (proxy execution) - Tttracer (proxy execution) - Renames curl[.]exe (masquerade) - Ttdinject (remote injection) - Pester (proxy execution)

elasticseclabs's tweet image. #ElasticSecurityLabs is observing #ValleyRAT infections using the following #LOLBins for execution:
- DeviceCredentialDeployment.exe (proxy execution)
- Tttracer (proxy execution)
- Renames curl[.]exe (masquerade)
- Ttdinject (remote injection)
- Pester (proxy execution)

#ElasticSecurityLabs saw phishing campaigns deploying LNK files masquerading as PDFs ([.]pdf[.]lnk) to load a Rust-based implant, using Discord C2 via the serenity crate. Bot Token/Server ID were AES-encrypted and Base64-encoded; for our PoC, we used our own.

elasticseclabs's tweet image. #ElasticSecurityLabs saw phishing campaigns deploying LNK files masquerading as PDFs ([.]pdf[.]lnk) to load a Rust-based implant, using Discord C2 via the serenity crate.

Bot Token/Server ID were AES-encrypted and Base64-encoded; for our PoC, we used our own.

#ElasticSecurityLabs gets to the root cause of an Authenticode signature error, reverse-engineering an undocumented Microsoft function in the process. Learn how we solved the problem here: go.es.io/3K2vG7u


#ElasticSecurityLabs continues to observe phishing campaigns leveraging Cloudflare tunnels distributing multiple malware families (#VenomRAT, #DCRat, #XWorm) simultaneously. These threat actors are abusing LLMs to produce simple Python shellcode loaders for injection

elasticseclabs's tweet image. #ElasticSecurityLabs continues to observe phishing campaigns leveraging Cloudflare tunnels distributing multiple malware families (#VenomRAT, #DCRat, #XWorm) simultaneously.

These threat actors are abusing LLMs to produce simple Python shellcode loaders for injection

#ElasticSecurityLabs is monitoring infections deploying #Akira Stealer, a Python stealer rewritten in Golang. Distribution involves packaging a malicious Electron application with the intended application in a .RAR archive. NodeJS Electron App -> Python loader -> Akira Stealer

elasticseclabs's tweet image. #ElasticSecurityLabs is monitoring infections deploying #Akira Stealer, a Python stealer rewritten in Golang. Distribution involves packaging a malicious Electron application with the intended application in a .RAR archive. 

NodeJS Electron App -> Python loader -> Akira Stealer

Summarizing hundreds of events and proving analysts with short, clear guidance is how it progresses— but it ends with a human decision to ACT. #ElasticSecurityLabs expertise is inside to help you do that. Stop spectating, start operating. -DK (@_devonkerr_)


The #ElasticSecurityLabs takeover continues on day 2 at #BHUSA! Come on over to booth 3546 to see Dhrumil in about 10 minutes, he’s breaking down AI for the modern SOC. I will see you there! -DK (@_devonkerr_)

elasticseclabs's tweet image. The #ElasticSecurityLabs takeover continues on day 2 at #BHUSA! Come on over to booth 3546 to see Dhrumil in about 10 minutes, he’s breaking down AI for the modern SOC. I will see you there! 

-DK (@_devonkerr_)

Greetings from the floor! Devon Kerr here from #ElasticSecurityLabs. We’re in Las Vegas this week at #BHUSA giving you a behind the scenes look at the big show. Stay tuned and come say hi! — DK (@_devonkerr_)

elasticseclabs's tweet image. Greetings from the floor! Devon Kerr here from #ElasticSecurityLabs. We’re in Las Vegas this week at #BHUSA giving you a behind the scenes look at the big show. Stay tuned and come say hi!

— DK (@_devonkerr_)

New research on NOVABLIGHT, a NodeJS infostealer sold as MaaS! Discover its tactics, from credential theft & cryptowallet compromise to advanced obfuscation & anti-analysis techniques: go.es.io/459JGDA #ElasticSecurityLabs #infostealer


The #ElasticSecurityLabs team is observing exploitation activity targeting on-premise SharePoint servers related to a series of CVEs, which can be chained together, allowing remote code execution. Use these two rules to help identify this activity: go.es.io/4f70FLk


In June, #ElasticSecurityLabs published 13 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/4kOcbfR

elasticseclabs's tweet image. In June, #ElasticSecurityLabs published 13 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/4kOcbfR

New research from our #ElasticSecurityLabs team: we dive into how infostealers are leveraging a stolen Shellter evasion tool to deploy data-stealing malware. Learn more & get our unpacker: go.es.io/4ldCM72 #malware #rhadamanthys #ghostpulse


New research from #ElasticSecurityLabs uncovers a new ClickFix campaign! Learn how attackers are using GHOSTPULSE and ARECHCLIENT2 (SECTOPRAT) in multi-stage attacks to deploy RATs and steal data. Stay informed: go.es.io/4l912GO


In May, #ElasticSecurityLabs published 52 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/45JHiVR #detectionengineering #SIEM #EDR

elasticseclabs's tweet image. In May, #ElasticSecurityLabs published 52 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/45JHiVR

#detectionengineering #SIEM #EDR

No results for "#elasticsecuritylabs"

In July and August, #ElasticSecurityLabs published 113 new rules! Take a look at the overview and learn how we manage these rulesets.

elasticseclabs's tweet image. In July and August, #ElasticSecurityLabs published 113 new rules! Take a look at the overview and learn how we manage these rulesets.

In September, #ElasticSecurityLabs published 78 new rules! Take a look at the overview and learn how we manage these rulesets.

elasticseclabs's tweet image. In September, #ElasticSecurityLabs published 78 new rules! Take a look at the overview and learn how we manage these rulesets.

#ElasticSecurityLabs is observing #ValleyRAT infections using the following #LOLBins for execution: - DeviceCredentialDeployment.exe (proxy execution) - Tttracer (proxy execution) - Renames curl[.]exe (masquerade) - Ttdinject (remote injection) - Pester (proxy execution)

elasticseclabs's tweet image. #ElasticSecurityLabs is observing #ValleyRAT infections using the following #LOLBins for execution:
- DeviceCredentialDeployment.exe (proxy execution)
- Tttracer (proxy execution)
- Renames curl[.]exe (masquerade)
- Ttdinject (remote injection)
- Pester (proxy execution)

#ElasticSecurityLabs saw phishing campaigns deploying LNK files masquerading as PDFs ([.]pdf[.]lnk) to load a Rust-based implant, using Discord C2 via the serenity crate. Bot Token/Server ID were AES-encrypted and Base64-encoded; for our PoC, we used our own.

elasticseclabs's tweet image. #ElasticSecurityLabs saw phishing campaigns deploying LNK files masquerading as PDFs ([.]pdf[.]lnk) to load a Rust-based implant, using Discord C2 via the serenity crate.

Bot Token/Server ID were AES-encrypted and Base64-encoded; for our PoC, we used our own.

In August, Elastic Security published 46 brand new detection rules! Check out the details: #ElasticSecurityLabs

elasticseclabs's tweet image. In August, Elastic Security published 46 brand new detection rules! Check out the details:

#ElasticSecurityLabs

In September, Elastic Security published 77 brand-new detection rules! Check out the overview ⬇️ #ElasticSecurityLabs

elasticseclabs's tweet image. In September, Elastic Security published 77 brand-new detection rules! Check out the overview ⬇️

#ElasticSecurityLabs

#ElasticSecurityLabs is monitoring infections deploying #Akira Stealer, a Python stealer rewritten in Golang. Distribution involves packaging a malicious Electron application with the intended application in a .RAR archive. NodeJS Electron App -> Python loader -> Akira Stealer

elasticseclabs's tweet image. #ElasticSecurityLabs is monitoring infections deploying #Akira Stealer, a Python stealer rewritten in Golang. Distribution involves packaging a malicious Electron application with the intended application in a .RAR archive. 

NodeJS Electron App -> Python loader -> Akira Stealer

#ElasticSecurityLabs continues to observe phishing campaigns leveraging Cloudflare tunnels distributing multiple malware families (#VenomRAT, #DCRat, #XWorm) simultaneously. These threat actors are abusing LLMs to produce simple Python shellcode loaders for injection

elasticseclabs's tweet image. #ElasticSecurityLabs continues to observe phishing campaigns leveraging Cloudflare tunnels distributing multiple malware families (#VenomRAT, #DCRat, #XWorm) simultaneously.

These threat actors are abusing LLMs to produce simple Python shellcode loaders for injection

Greetings from the floor! Devon Kerr here from #ElasticSecurityLabs. We’re in Las Vegas this week at #BHUSA giving you a behind the scenes look at the big show. Stay tuned and come say hi! — DK (@_devonkerr_)

elasticseclabs's tweet image. Greetings from the floor! Devon Kerr here from #ElasticSecurityLabs. We’re in Las Vegas this week at #BHUSA giving you a behind the scenes look at the big show. Stay tuned and come say hi!

— DK (@_devonkerr_)

In May, #ElasticSecurityLabs published 52 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/45JHiVR #detectionengineering #SIEM #EDR

elasticseclabs's tweet image. In May, #ElasticSecurityLabs published 52 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/45JHiVR

#detectionengineering #SIEM #EDR

In October, Elastic Security published 81 brand-new detection rules! Check out the overview and see all of our detection rules here: go.es.io/48IpI4g #ElasticSecurityLabs #SIEM #EDR

elasticseclabs's tweet image. In October, Elastic Security published 81 brand-new detection rules! Check out the overview and see all of our detection rules here: go.es.io/48IpI4g 

#ElasticSecurityLabs #SIEM #EDR

In November and December, #ElasticSecurityLabs published 47 new rules to @elastic Security! Browse these rules and more: go.es.io/3VzdBRz Our next protection update will occur in early February. Happy holidays from our detection engineering team!

elasticseclabs's tweet image. In November and December, #ElasticSecurityLabs published 47 new rules to @elastic Security! Browse these rules and more: go.es.io/3VzdBRz 

Our next protection update will occur in early February. Happy holidays from our detection engineering team!
elasticseclabs's tweet image. In November and December, #ElasticSecurityLabs published 47 new rules to @elastic Security! Browse these rules and more: go.es.io/3VzdBRz 

Our next protection update will occur in early February. Happy holidays from our detection engineering team!
elasticseclabs's tweet image. In November and December, #ElasticSecurityLabs published 47 new rules to @elastic Security! Browse these rules and more: go.es.io/3VzdBRz 

Our next protection update will occur in early February. Happy holidays from our detection engineering team!
elasticseclabs's tweet image. In November and December, #ElasticSecurityLabs published 47 new rules to @elastic Security! Browse these rules and more: go.es.io/3VzdBRz 

Our next protection update will occur in early February. Happy holidays from our detection engineering team!

In March, #ElasticSecurityLabs published 67 new rules! Take a look at the overview, or check out our entire library of protections here: go.es.io/42qPQhc #detectionengineering #SIEM #EDR

elasticseclabs's tweet image. In March, #ElasticSecurityLabs published 67 new rules! Take a look at the overview, or check out our entire library of protections here: go.es.io/42qPQhc 

#detectionengineering #SIEM #EDR

You can access our #detectionengineering repos, but how about a closer look? The 2025 State of Detection Engineering at Elastic is a new #report from #ElasticSecurityLabs detailing how we create and assess our prebuilt rules. Check it out: go.es.io/4jnrXhA

elasticseclabs's tweet image. You can access our #detectionengineering repos, but how about a closer look?

The 2025 State of Detection Engineering at Elastic is a new #report from #ElasticSecurityLabs detailing how we create and assess our prebuilt rules. Check it out: go.es.io/4jnrXhA

In April, #ElasticSecurityLabs published 62 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/3EX0NiN #detectionengineering #SIEM #EDR

elasticseclabs's tweet image. In April, #ElasticSecurityLabs published 62 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/3EX0NiN

#detectionengineering #SIEM #EDR

The #ElasticSecurityLabs takeover continues on day 2 at #BHUSA! Come on over to booth 3546 to see Dhrumil in about 10 minutes, he’s breaking down AI for the modern SOC. I will see you there! -DK (@_devonkerr_)

elasticseclabs's tweet image. The #ElasticSecurityLabs takeover continues on day 2 at #BHUSA! Come on over to booth 3546 to see Dhrumil in about 10 minutes, he’s breaking down AI for the modern SOC. I will see you there! 

-DK (@_devonkerr_)

In February, #ElasticSecurityLabs published 55 brand new rules! Take a look at the overview, or check out our entire library of #detectionrules here: go.es.io/4kadFBQ #detectionengineering #EDR

elasticseclabs's tweet image. In February, #ElasticSecurityLabs published 55 brand new rules! Take a look at the overview, or check out our entire library of #detectionrules here: go.es.io/4kadFBQ 

#detectionengineering #EDR

Did you miss our webinar on the 2024 Elastic Global Threat Report? It’s available on-demand for your viewing entertainment! Our expert recap is ready whenever you are: go.es.io/3YrKPmq #ElasticSecurityLabs

elasticseclabs's tweet image. Did you miss our webinar on the 2024 Elastic Global Threat Report? It’s available on-demand for your viewing entertainment! Our expert recap is ready whenever you are: go.es.io/3YrKPmq 

#ElasticSecurityLabs

In January, Elastic Security published 77 brand-new rules! Take a look at the overview, or check out our entire detection rule library here: go.es.io/4hpyAir #ElasticSecurityLabs

elasticseclabs's tweet image. In January, Elastic Security published 77 brand-new rules! Take a look at the overview, or check out our entire detection rule library here: go.es.io/4hpyAir

#ElasticSecurityLabs

Ebury is some fascinating and sophisticated malware! Props to @ESETresearch for their extensive threat research report. Happy to see our coverage at @elastic is on point. 🔍👏 #ebury #ElasticSecurityLabs #elastic

RFGroenewoud's tweet image. Ebury is some fascinating and sophisticated malware! Props to @ESETresearch for their extensive threat research report. Happy to see our coverage at @elastic is on point. 🔍👏

#ebury #ElasticSecurityLabs #elastic

#Breaking #ESETresearch releases a paper about Ebury, among the most advanced server-side Linux malware, which was deployed to 400,000 servers over the course of 15 years, primarily for financial gain. @marc_etienne_ welivesecurity.com/en/eset-resear… 1/8



Loading...

Something went wrong.


Something went wrong.


United States Trends