101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

503
active users

#cobaltstrike

0 posts0 participants0 posts today

For hobbyist Cobalt Strike Beacon collectors, note that the recently announced 4.11 update introduces a number of changes to frustrate Beacon configuration extraction, namely through the new `transform-obfuscate` field.

When set, this field can apply multiple layers of encoding, encryption and compression (with some recent Beacons observed with a 32 byte XOR key, configurable upto 2048 bytes!).

While still reasonably trivial to decode manually, standard automated workflows (say, through the SentinelOne parser) will now fail, not least because of changes to the well-known field markers.

Beacons with these characteristics have thus far been observed with watermarks indicative of licensed instances, though I imagine it is only a matter of time before the 4.11 capabilities become accessible to all manner of miscreants.

A sample configuration, via a staged Beacon on 104.42.26[.]200 is attached, including the three distinct XOR keys used to decode it.

cobaltstrike.com/blog/cobalt-s

Europol coordinates global action against criminal abuse of Cobalt Strike 🔥 We are very proud that together with our partner @spamhaus we are part of this international operation 👏 🎉

Indicators on rogue Cobalt Strike botnet C2 servers related to the operation are being made available on ThreatFox 🦊 :

➡ threatfox.abuse.ch/browse/malw

In addition, The Spamhaus Project is sending out abuse reports to network owners hosting such rogue (active) Cobalt Strike servers 📨 . If you are a network operator receiving such an abuse report, you should take action on it swiftly 🙏

Further reading:
👉 europol.europa.eu/media-press/

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #40/2023 is out! It includes the following and much more:

🇺🇸 🗳️ D.C. Board of #Elections confirms voter data stolen in site hack
🔓 🪪 #MGM Resorts confirms hackers stole customers’ personal data during #cyberattack
🔓 🧬 #DNA testing service 23andMe investigating theft of user data
🔓 🎧 #Sony confirms #databreach impacting thousands in the U.S.
📱 💥 Lyca Mobile Group Services Significantly Disrupted by Cyberattack
🔓 🕵🏻‍♂️ #NATO investigating breach, #leak of internal documents
🔓 🇪🇺 European Telecommunications Standards Institute Discloses Data Breach
🔓 🏨 #MotelOne discloses data breach following #ransomware attack
🇰🇵 💰 North Korea's #Lazarus Group Launders $900 Million in #Cryptocurrency
🇧🇪 🇨🇳 #Alibaba accused of ‘possible espionage’ at European hub
🇨🇳 #China-linked cyberspies #backdoor #semiconductor firms with #CobaltStrike
🥸 Meet LostTrust #ransomware — A likely rebrand of the #MetaEncryptor gang
🇬🇾 🇨🇳 #Guyana Governmental Entity Hit by #DinodasRAT in #CyberEspionage Attack
🇷🇺 🇺🇸 #FBI most-wanted Russian hacker reveals why he burned his passport
🇺🇸 🏥 #FDA cyber mandates for #medicaldevices goes into effect
☁️ 🔓 Number of Internet-Exposed #ICS Drops Below 100,000
☁️ #Microsoft Warns of Cyber Attacks Attempting to Breach Cloud via #SQL Server Instance
🦠 📈 #QakBot Threat Actors Still in Action, Using Ransom Knight and Remcos RAT in Latest Attacks
🔓 🍏 #Apple Warns of Newly Exploited iOS 17 Kernel Zero-Day
🎣 🧑🏻‍💼 US Executives Targeted in #Phishing Attacks Exploiting Flaw in Indeed Job Platform
🦠 🏦 #Zanubis #Android Banking Trojan Poses as Peruvian Government App to Target Users
🦠 🇮🇷 Iranian APT Group #OilRig Using New Menorah #Malware for Covert Operations
🔐 ☁️ #Amazon to make #MFA mandatory for 'root' #AWS accounts by mid-2024
🛡️ 🧅 #Microsoft Defender no longer flags #Tor Browser as malware
👀 X-Force uncovers global #NetScaler Gateway credential harvesting campaign
🐛 💰 Zero-days for hacking #WhatsApp are now worth millions of dollars
🩹 #Cisco fixes hard-coded root credentials in Emergency Responder
🔓 Vulnerabilities in #Supermicro BMCs could allow for unkillable server #rootkits
🔓 🐧 Looney Tunables: New #Linux Flaw Enables Privilege Escalation on Major Distributions
🐍 Warning: #PyTorch Models Vulnerable to Remote Code Execution via ShellTorch
🩹 Microsoft Edge, Teams get fixes for zero-days in #opensource libraries
🔓 🔥 Live Exploitation Underscores Urgency to Patch Critical WS-FTP Server Flaw
☁️ Cloudflare #DDoS protections ironically bypassed using #Cloudflare

📚 This week's recommended reading is: "8 Steps to Better Security: A Simple Cyber Resilience Guide for Business" by Kim Crawley

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

infosec-mashup.santolaria.net/

X’s Infosec Newsletter · InfoSec MASHUP - Week 40/2023By Xavier «X» Santolaria

"🚨 Earth Lusca's New Linux Backdoor: SprySOCKS Unveiled! 🐙"

Earth Lusca, a China-linked threat actor, has been spotted employing a novel Linux backdoor, dubbed "SprySOCKS". This malware seems to have evolved from the open-source Windows backdoor Trochilus. The backdoor showcases swift behavior and a SOCKS implementation, hence the name. 🐍💼

SprySOCKS's structure is reminiscent of the RedLeaves backdoor, a RAT known to infect Windows machines. This backdoor is still under development, with different versions observed. Its interactive shell seems to draw inspiration from the Linux variant of the Derusbi malware. 🕵️‍♂️🔍

Recent activities of Earth Lusca indicate a focus on Southeast Asia, Central Asia, and the Balkans. Their primary targets? Government departments in foreign affairs, technology, and telecommunications. They've been exploiting server-based N-day vulnerabilities, including CVE-2022-40684, CVE-2022-39952, and more. Once inside, they deploy Cobalt Strike for lateral movement, aiming to exfiltrate sensitive data and conduct long-term espionage. 🌍🎯

Source: Trend Micro Research

Tags: #EarthLusca #SprySOCKS #LinuxBackdoor #CyberSecurity #APT #ThreatIntelligence #RedLeaves #Trochilus #CobaltStrike 🌐🔐🖥️

Trend Micro · Earth Lusca Employs New Linux Backdoor, Uses Cobalt Strike for Lateral MovementWhile monitoring Earth Lusca, we discovered an intriguing, encrypted file on the threat actor's server — a Linux-based malware, which appears to originate from the open-source Windows backdoor Trochilus, which we've dubbed SprySOCKS due to its swift behavior and SOCKS implementation.

2023-05-22 (Mon) & 2023-05-23 (Tue): TA577 pushes #Pikabot

2023-05-24 (Wed): TA577 back to pushing #Qabkot (#Qbot)

Pikabot:

- malware-traffic-analysis.net/2

- malware-traffic-analysis.net/2

Qakbot (TA570 obama264):

- malware-traffic-analysis.net/2

I was lucky enough to get #CobaltStrike with the two Pikabot infections, so I wrote tweets for my employer on the bird site.

See the above links for #pcap files, malware samples, IOCs, and links to my employer's tweets for the Pikabot activity.

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #20/2023 is out! It includes, but not only:

🔓 PoC Tool Exploits Unpatched #KeePass Vulnerability to Retrieve Master Passwords
📱 Millions of Smartphones Distributed Worldwide With Preinstalled ‘Guerrilla’ #Malware
📨 #MalasLocker ransomware targets #Zimbra servers, demands charity donation
🇯🇵 🇺🇦 🇮🇪 🇮🇸 4 Countries Join #NATO Cyber Defense Center
🤐 New #ZIP domains spark debate among #cybersecurity experts
🍏 Open-source #CobaltStrike port 'Geacon' used in #macOS attacks
🇺🇸 #IBM Snaps up DSPM Startup Polar Security
🇷🇺 🇺🇸 Russian Hacker “Wazawaka” Indicted for #Ransomware
🇺🇸 🇦🇺 #StopRansomware: BianLian Ransomware Group
🇨🇳 Malware turns home routers into proxies for Chinese state-sponsored hackers
🏠 🔌 ‘FriendlyName’ Buffer Overflow Vulnerability in #Wemo Smart Plug V2
🔙 🚪 Stealthy MerDoor malware uncovered after five years of attacks
🇱🇻 ✈️ Airline exposes passenger info to others due to a 'technical error'
‣ New 'MichaelKors' Ransomware-as-a-Service Targeting #Linux and #VMware ESXi Systems
🇺🇸 🇰🇷 Ransomware group claims 2.5 terabytes of stolen data less than a month after emerging online
🇰🇵 North Korea funding half its missile program with #cryptocurrency theft and cyberattacks
🇺🇸 Former #Ubiquiti Employee Gets 6 Years in Jail for $2 Million Crypto Extortion Case
🇬🇧 #Capita warns customers they should assume data was stolen

#cyberdefense #security #automation #airline #data

📚 This week's recommended reading is: "PowerShell Automation and Scripting for CyberSecurity: Hacking and Defense for Red and Blue Teamers" by Miriam C. Wiesner

Subscribe to the #newsletter to have it piping hot in your inbox every Sunday ⬇️

0x58.substack.com/p/infosec-ma

X’s Infosec NewsletterInfoSec MASHUP - Week 20/2023 By Xavier «X» Santolaria

Tweet I wrote for my employer at the bird site: twitter.com/Unit42_Intel/statu

2023-05-17 (Wednesday): Today, this week's BB28 #Qakbot-style distribution chain pushed #Pikabot instead of Qakbot. Followed up with #CobaltStrike using #DNSTunneling. We later saw additional Cobalt Strike traffic over HTTPS. List of IOCs available at github.com/pan-unit42/tweets/b

A carved #pcap of the infection traffic (removed everything not related to the #Pikabot & #CobaltStrike) and the associated malware/registry updates available at malware-traffic-analysis.net/2

MSFT obtains court order to sinkhole Cobalt Strike C&C traffic.

The order lists 16 John Does as

Appendix A of the order identifies the Hosting Companies/Data
Centers Where Defendants
Placed the Command and
Control Servers and the 1000 or so C&C IP addresses.

It also includes the Whois for the ~110 C&C domains.

The contact data for these are redacted or unavailable from the ccTLD operator.

So...

_none_ of the domain registrations yielded the name and contact of a party that could be named as a defendant in the action?

Microsoft's attorneys have filed dozens of orders like this one. Surely they asked for a Whois reveal or asked for billing data.

So...

_none_ of the domain registration BILLING DATA yielded the name and contact of a party that could be named as a defendant in the action?

databreachtoday.com/microsoft-

#ransomware #malware #cobaltstrike #c2 #whois #itsalwaysdns #exceptwhenitsIPs

Set aside privacy protection (it can be managed for all natural person's complete and accurate contact data) but share with me:

www.databreachtoday.comMicrosoft Gets Court Order to Sinkhole Cobalt Strike TrafficCobalt maker Fortra, Microsoft and the Health Information Sharing and Analysis Center obtained a U.S. federal court order redirecting into sinkhole servers the

The cyber crims are working through the holidays, and so are we. Here's Monday's newsletter on all the developments in infosec, just for you:

opalsec.substack.com/p/soc-gou

International law enforcement agencies notched up another win last week, having successfully taken down the notorious Initial Access Broker Genesis Marketplace last week - or did they? The site remains active and the admins appear to have gotten away unscathed, so what victory was there to be had?

#Microsoft, in collaboration with #Fortra and the Health ISAC, are commencing work to dismantle infrastructure used by actors abusing cracked versions of the offensive Cobalt Strike framework. It'll be an uphill battle, and it remains to be seen if they can make a dent in the sprawling global footprint achieved by the cyber crim's implant of choice.

Be warned - a PoC exploit has been released for a CVSS 10.0 Sandbox Escape vulnerability impacting the VM2 JavaScript Sandbox, which itself has >16 million monthly downloads on #npm. Researchers have also uncovered a vulnerability in #WiFi APs that could allow hijacking and snooping of client traffic; #Apple patches two actively exploited 0-days in #iOS, #iPadOS and #macOS, and #CISA urges patching of #Zimbra bugs exploited by Russian APTs.

The #redteam have some great tooling and tradecraft to help with Microsoft #MFA enumeration and performing port forwarding on compromised #Cisco gear, while the #blueteam are again spoiled for choice - a new database of exploited drivers, research on abuse of SFX archives for persistence, and threat models for #AWS KMS and CI/CD pipelines - take your pick!

Check out the newsletter and catch all this and much more excellent threat and tradecraft research, to help you gear up for the week ahead:

opalsec.substack.com/p/soc-gou

Happy Easter Monday to everyone lucky enough to be enjoying the holiday, I hope you're all having a great break wherever you are, and a reminder that if you're travelling on the roads, to please drive safe!

OpalsecSOC Goulash: Weekend Wrap-UpBy Opalsec
#infosec#cyber#news

Happy Monday folks, I hope you had a restful weekend and managed to take a breather from all things cyber! Time to get back into it though, so let me give you hand - catch up on the week’s infosec news with the latest issue of our newsletter:

opalsec.substack.com/p/soc-gou

#Emotet are back and are using…OneNote lures? ISO disk images? Malvertising? Nah – they’re sticking with tier tried and true TTPs – their Red Dawn maldoc template from last year; macro-enabled documents as lures, and null-byte padding to evade automated scanners.

We’ve highlighted a report on the Xenomorph #Android Banking Trojan, which added support for targeting accounts of over 400 banks; automated bypassing of MFA-protected app logins, and a Session Token stealer module. With capabilities like these becoming the norm, is it time to take a closer look at the threat Mobile Malware could pose to enterprise networks?

North Korean hackers have demonstrated yet again that they’re tracking and integrating the latest techniques, and investing in malware development. A recent campaign saw eight new pieces of malware distributed throughout the kill chain, leveraging #Microsoft #InTune to deliver payloads and an in-memory dropper to abuse the #BYOVD technique and evade EDR solutions.

A joint investigation by #Mandiant and #SonicWall has unearthed a two-year campaign by Chinese actors, enabled through exploitation of unpatched SMA100 appliances and delivery of tailored payloads. A critical vulnerability reported by #Fortinet this week helps reinforce the point that perimeter devices need to be patched with urgency, as it’s a well-documented target for Chinese-affiliated actors.

#HiatusRAT is a novel malware targeting #DrayTek routers, sniffing network traffic and proxying C2 traffic to forward-deployed implants. TTPs employed in recent #BatLoader and #Qakbot campaigns are also worth taking note of, as is #GoBruteforcer, a new malware family targeting specific web server applications to brute force logins and deploy an IRC bot for C2.

Those in Vulnerability Management should take particular note of the #Veeam vulnerability, which appears trivial to exploit and actually delivers plaintext credentials to the attacker. CISA have also taken note of nearly 40k exploit attempts of a 2 year old code-exec-as-root vulnerability in the #VMWare Cloud Foundation product in the last two months, so make sure you’re patched against it.

#Redteam members have some excellent reading to look forward to, looking at HTTP request smuggling to harvest AD credentials and persisting with a MitM Exchange server, as well as a detailed post that examines #CobaltStrike’s reflective loading capability;

The #blueteam has some great tradecraft tips from @inversecos on #Azure DFIR, as well as tools to help scan websites for malicious objects, and to combat the new #Stealc #infostealer and well-established Raccoon Stealer.

Catch all this and much more in this week's newsletter:

opalsec.substack.com/p/soc-gou

OpalsecSOC Goulash: Weekend Wrap-UpBy Opalsec
#infosec#cyber#news

This week's #infosec newsletter issue is out! Have a look at it. It includes, but not only:

  • CISA warns of actively exploited #Plex bug after #LastPass breach
  • Brazil seizing #FlipperZero shipments to prevent use in crime
  • #IBM X-Force on defining the #CobaltStrike Reflective Loader
  • Security researchers targeted with new #malware via job offers on #LinkedIn
  • Alleged NetWire RAT Operator Arrested in Croatia as FBI Seizes Website
  • Xenomorph #Android malware now steals data from 400 banks
  • #GitHub makes 2FA mandatory next week for active developers
  • The #Akuvox E11 door phone/intercom is riddled with security holes
  • Custom Chinese Malware Found on #SonicWall Appliance
  • Building Great OT Incident Response Tabletop Exercises, by @hacks4pancakes
  • Warning: Don't Let #Google Manage Your #Passwords
  • #Fortinet warns of new critical unauthenticated RCE #vulnerability
  • #Veeam fixes bug that lets hackers breach #backup infrastructure
  • AI-Powered '#BlackMamba' Keylogging Attack Evades Modern #EDR Security
  • Hard-coded secrets up 67% as secrets sprawl threatens software supply chain
  • #Emotet malware attacks return after three-month break

.. And many more. Subscribe to receive it directly in your inbox every Sunday!

#cybersecurity #security #newsletter

0x58.substack.com/p/my-shared-

X’s Infosec NewsletterMy Shared Links - Week 10/2023 By Xavier «X» Santolaria

Originally posted on Twitter at: twitter.com/Unit42_Intel/statu

2023-01-31 (Tuesday) - #Qakbot (#Qbot) returns after one month hiatus, now using OneNote (.one) files as initial lure. Saw #CobaltStrike on 104.237.219[.]36 using ciruvowuto[.]com as the domain. Also saw VNC traffic from this infection. IoCs available at github.com/pan-unit42/tweets/b

#pcap and malware samples at malware-traffic-analysis.net/2

VNC traffic on 78.31.67[.]7 port 443.

Overall, this is the same type of Qakbot activity seen last year. The only real difference is the OneNote files.