101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

486
active users

#LOLbas

0 posts0 participants0 posts today
ANY.RUN<p>🚨 New <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> campaign uses <a href="https://infosec.exchange/tags/DBatLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DBatLoader</span></a> to drop <a href="https://infosec.exchange/tags/Remcos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Remcos</span></a> RAT.<br>The infection relies on <a href="https://infosec.exchange/tags/UAC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UAC</span></a> bypass with mock directories, obfuscated .cmd scripts, Windows <a href="https://infosec.exchange/tags/LOLBAS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LOLBAS</span></a> techniques, and advanced persistence techniques. At the time of analysis, the samples had not yet been submitted to <a href="https://infosec.exchange/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirusTotal</span></a> ⚠️</p><p>🔗 Execution chain:<br><a href="https://infosec.exchange/tags/Phish" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phish</span></a> ➡️ Archive ➡️ DBatLoader ➡️ CMD ➡️ SndVol.exe (Remcos injected) </p><p>👨‍💻 <a href="https://infosec.exchange/tags/ANYRUN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ANYRUN</span></a> allows analysts to quickly uncover stealth techniques like LOLBAS abuse, injection, and UAC bypass, all within a single interactive analysis session. See analysis: <a href="https://app.any.run/tasks/c57ca499-51f5-4c50-a91f-70bc5a60b98d/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=dbatloader&amp;utm_term=150525&amp;utm_content=linktoservice" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">app.any.run/tasks/c57ca499-51f</span><span class="invisible">5-4c50-a91f-70bc5a60b98d/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=dbatloader&amp;utm_term=150525&amp;utm_content=linktoservice</span></a></p><p>🛠️ Key techniques:<br>🔹 <a href="https://infosec.exchange/tags/Obfuscated" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Obfuscated</span></a> with <a href="https://infosec.exchange/tags/BatCloak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BatCloak</span></a> .cmd files are used to download and run <a href="https://infosec.exchange/tags/payload" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>payload</span></a>.<br>🔹 Remcos injects into trusted system processes (SndVol.exe, colorcpl.exe). <br>🔹 Scheduled tasks trigger a Cmwdnsyn.url file, which launches a .pif dropper to maintain persistence. <br>🔹 Esentutl.exe is abused via LOLBAS to copy cmd.exe into the alpha.pif file. <br>🔹 UAC bypass is achieved with fake directories like “C:\Windows “ (note the trailing space), exploiting how Windows handles folder names. </p><p>⚠️ This threat uses multiple layers of stealth and abuse of built-in Windows tools. Behavioral detection and attention to unusual file paths or another activity are crucial to catching it early. <a href="https://infosec.exchange/tags/ANYRUN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ANYRUN</span></a> Sandbox provides the visibility needed to spot these techniques in real time 🚀</p>
Wietze<p><a href="https://infosec.exchange/tags/LOLBAS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LOLBAS</span></a> project update:</p><p>Entries now have placeholders for paths, URLs, and more. This makes it easier to visually see what parts are "variable", and for LOLBAS API users (<a href="https://lolbas-project.github.io/api/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lolbas-project.github.io/api/</span><span class="invisible"></span></a>) it'll be easier to use with automation.</p><p>Check it out:<br>⭐ <a href="https://lolbas-project.github.io" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lolbas-project.github.io</span><span class="invisible"></span></a></p>
infosystir<p>Walk through a customer incident with me!</p><p>What happens when attackers can SEO their fake application to the first page of search results, alerts fire along the way, and you have a customer and secops team that are top notch!</p><p><a href="https://www.blumira.com/masked-application-attack-incident-report/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">blumira.com/masked-application</span><span class="invisible">-attack-incident-report/</span></a></p><p><a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/smbsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>smbsecurity</span></a> <a href="https://infosec.exchange/tags/lolbas" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lolbas</span></a> <a href="https://infosec.exchange/tags/bankingindustry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bankingindustry</span></a> <a href="https://infosec.exchange/tags/creditunions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>creditunions</span></a></p>
Huntress<p>Did you know that the finger command can be used for data exfil? We recently had an incident where this type of activity was found </p><p><a href="https://www.huntress.com/blog/cant-touch-this-data-exfiltration-via-finger" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">huntress.com/blog/cant-touch-t</span><span class="invisible">his-data-exfiltration-via-finger</span></a></p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/lolbins" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lolbins</span></a> <a href="https://infosec.exchange/tags/lolbas" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lolbas</span></a> <a href="https://infosec.exchange/tags/exfil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exfil</span></a> <a href="https://infosec.exchange/tags/mchammer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mchammer</span></a> <a href="https://infosec.exchange/tags/CTI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTI</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <br><span class="h-card" translate="no"><a href="https://bird.makeup/users/keydet89" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>keydet89</span></a></span></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🔍 Researchers Uncover 12 New LOLBAS Binaries Used by Attackers 🕵️‍♂️"</p><p>Hackers are increasingly using LOLBAS (Living-Off-the-Land Binaries-And-Scripts) to exploit legitimate tools and hide illicit actions. As LOLBAS gains traction, experts are seeking new detection methods. Stay vigilant! 💻🔒</p><p>Researchers Discover 12 New LOLBAS Binaries Used by Attackers<br>Introduction<br>Living-Off-the-Land Binaries And Scripts (LOLBAS) is a popular methodology used by threat actors to exploit legitimate tools for hiding their illicit actions. As LOLBAS gains traction rapidly in cyber attacks, experts are actively seeking new methods to detect unknown malicious binaries for better defense mechanisms.</p><p>New LOLBAS Binaries Discovered<br>Cybersecurity researchers at Pentera Labs recently discovered new LOLBAS binaries that are actively used by threat actors to deploy malware. Over 3000 Windows binaries pose the LOLBAS discovery challenge. Even with the automation approach, researchers found 12 new files in 4 weeks, marking a 30% rise in known downloaders and executors.</p><p>LOLBAS: An Evergreen Type of Cyber Attack<br>LOLBAS has been a known concept in the cybersecurity landscape for some time now. However, it continues to gain its pace as one of the most dominant trends in cyber-attacks. It is important to understand how hackers are constantly seeking to exploit the legitimate tools within your systems and then turn them against you for their illicit purposes. Due to its exceptional capability to evade detection, LOLBAS remains a significant concern in cyber attacks. What makes it so powerful is its adeptness at utilizing pre-installed legit system tools to execute malicious actions.</p><p>Detection of Binaries<br>The automated solution generates the download attempt, lists binaries, and then it triggers the downloader via a simple HTTP command structure with two parts:</p><p>The path of the potential downloader<br>A URL to download the file from<br>The second part involves an HTTP server for receiving feedback on download attempts, with log records indicating file download attempts. This automated method revealed 6 additional downloaders, leading to a 30% boost in the LOLBAS list with a total of 9 discoveries.</p><p>In this scenario, a hacker will deploy the LOLBAS downloader to acquire powerful malware and then execute it stealthily using LOLBAS executors, disguising it as legitimate processes.</p><p>The complete process could be automated via two tools:</p><p>IDApython: It finds API call cross-references and decompiles.<br>ChatGPT: It assists in analyzing function arguments’ connections for a solid POC.<br>The proposed static approach surpasses the dynamic analysis by focusing on low-level details of the code like automating reverse engineering for deeper code insights, revealing structure, behavior, and potential issues. This complete analysis offers a proactive defense roadmap, empowering security pros to predict and prevent evolving cyber threats.</p><p>Conclusion<br>The discovery of new LOLBAS binaries and the development of automated methods for their detection underscore the evolving nature of cyber threats. As hackers continue to exploit legitimate tools for illicit purposes, the need for proactive and robust defense mechanisms becomes increasingly critical. By leveraging tools like IDApython and ChatGPT, and focusing on low-level details of the code, security professionals can gain deeper insights into potential threats and devise strategies to predict and prevent them.</p><p>Source: <a href="https://cybersecuritynews.com/12-new-lolbas-binaries/" rel="nofollow noopener" target="_blank">Cybersecurity News</a></p><p>Tags: <a href="https://infosec.exchange/tags/LOLBAS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LOLBAS</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>