101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

483
active users

#microsoftsecurity

0 posts0 participants0 posts today

Die indischen Betrugs-Callcenter haben offenbar inzwischen vom angeblichen #microsoftsecurity-Scam auf #paypalscam umgestellt. Gerade hatte ich einen in der Leitung. Da ich heute Feiertag habe und gut gelaunt war, hab ich das Spiel ca. 10 Minuten mitgespielt, bevor ich ihm gesagt habe, dass ich gar kein #PayPal-Konto habe.

Es ging die ganze Zeit darum, #anydesk auf einem meiner Geräte zu installieren und dann meine Daten abzugreifen.

"🌪️ Mint Sandstorm: Sophisticated Phishing Campaign Unleashed by APT35 🚨"

Microsoft's security blog reveals an intricate phishing campaign, "Mint Sandstorm," by the subgroup PHOSPHORUS (also known as APT35 and Charming Kitten), linked to Iran's Islamic Revolutionary Guard Corps. This campaign targets individuals in universities and research organizations involved in Middle Eastern affairs across various countries. Unique tactics include bespoke phishing lures, using compromised legitimate email accounts, and deploying custom backdoors like MediaPl and MischiefTut. These tools allow for encrypted communications, reconnaissance, and persistence in target environments. Microsoft suggests using Attack Simulator in Defender for Office 365, enabling SmartScreen on browsers, and activating cloud-delivered protection to mitigate risks.

Microsoft's security blog

Tags: #CyberSecurity #Phishing #APT35 #CharmingKitten #MintSandstorm #MicrosoftSecurity #InfoSec #ThreatIntelligence

Mitre - APT35

Microsoft Security Blog · New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs | Microsoft Security BlogSince November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHORUS) targeting high-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza, Israel, the United Kingdom, and the United States. In this campaign, the threat actor used bespoke phishing lures in an attempt to socially engineer targets into downloading malicious files.

"⚠️ CVE-2023-36025: A Stepping Stone in Phemedrone Stealer Attacks"

Trend Micro's recent investigation reveals the exploitation of CVE-2023-36025, a Windows Defender SmartScreen bypass, in the Phemedrone Stealer campaign. This vulnerability allows attackers to evade defense by using .url files to download malicious .cpl scripts unnoticed. Phemedrone Stealer, an open-source malware maintained on GitHub and Telegram, targets web browsers, cryptocurrency wallets, and messaging apps like Telegram and Steam, harvesting sensitive data and system information. Notably, CVE-2023-36025 was patched by Microsoft in Nov 2023, but remains on CISA's Known Exploited Vulnerabilities list due to its active exploitation.

The attack involves hosting malicious Internet Shortcut files on platforms like Discord, often disguised using URL shorteners. Upon execution, these files download a .cpl file, bypassing the usual security prompts. This leverages the MITRE ATT&CK technique T1218.002, using control.exe to run .cpl files. The subsequent stages involve a PowerShell loader hosted on GitHub, and a second-stage loader known as Donut, which executes the final payload in memory. This sophisticated attack sequence showcases the complexity and stealth of modern cyber threats.

Phemedrone's payload is versatile, targeting various applications for sensitive information like passwords, files, and system data. It uses advanced techniques for data handling and compression, highlighting the need for vigilant cybersecurity practices.

Tags: #CyberSecurity #CVE202336025 #PhemedroneStealer #DefenseEvasion #Malware #TrendMicro #MicrosoftSecurity #CISA #MITREATTACK #DonutLoader

MITRE ATT&CK - T1218.002

Source: trendmicro.com/en_us/research/

attack.mitre.orgSystem Binary Proxy Execution: Control Panel, Sub-technique T1218.002 - Enterprise | MITRE ATT&CK®

"🚨 Windows App Installer Vulnerability: A New Twist in Cybersecurity 🚨"

Microsoft has temporarily disabled the MSIX ms-appinstaller protocol handler in Windows due to security concerns. This action was taken because malicious groups, like the Sangria Tempest group (also known as FIN7), were using it to distribute malware. This vulnerability, known as CVE-2021-43890, was exploited through phishing and malicious ads, often resulting in ransomware attacks. These attacks were able to bypass Defender SmartScreen and browser security warnings. Microsoft initially disabled this handler in February 2022 to counter Emotet attacks and has now decided to disable it again due to ongoing misuse by financially motivated threat groups.

The MSIX ms-appinstaller protocol handler is an important part of the MSIX package format. It simplifies the process of installing Windows applications directly from a URL, making it easier for developers and users. MSIX is a modern app package format for Windows that combines the best features of MSI, .appx, App-V, and ClickOnce installation technologies. Its main goal is to help developers package and distribute their applications efficiently and reliably, ensuring compatibility.

For more on CVE-2021-43890: Microsoft Advisory
For details on FIN7: MITRE - FIN7

Tags: #CyberSecurity #WindowsVulnerability #MSIX #ProtocolHandler #Malware #Ransomware #Phishing #ThreatIntelligence #SangriaTempest #FIN7 #MicrosoftSecurity

Sources:

msrc.microsoft.comSecurity Update Guide - Microsoft Security Response Center

𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗗𝗶𝗴𝗶𝘁𝗮𝗹 𝗗𝗲𝗳𝗲𝗻𝘀𝗲 𝗥𝗲𝗽𝗼𝗿𝘁 𝟮𝟬𝟮𝟯 𝗶𝘀 𝗼𝘂𝘁!

It covers trends between July 2022 and June 2023 across nation-state activity, cybercrime, and defense techniques.

➡ Blog: blogs.microsoft.com/on-the-iss

➡Report: aka.ms/aka.ms.mddrrep

➡Executive summary: aka.ms/aka.ms.mddrexecrep

𝗗𝗲𝗳𝗲𝗻𝗱𝗶𝗻𝗴 𝗻𝗲𝘄 𝘃𝗲𝗰𝘁𝗼𝗿𝘀: 𝗧𝗵𝗿𝗲𝗮𝘁 𝗮𝗰𝘁𝗼𝗿𝘀 𝗮𝘁𝘁𝗲𝗺𝗽𝘁 𝗦𝗤𝗟 𝗦𝗲𝗿𝘃𝗲𝗿 𝘁𝗼 𝗰𝗹𝗼𝘂𝗱 𝗹𝗮𝘁𝗲𝗿𝗮𝗹 𝗺𝗼𝘃𝗲𝗺𝗲𝗻𝘁

Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.

Attackers are now attempting to move laterally into cloud environments via SQL Server instances—a method previously seen in VMs and Kubernetes clusters but not in SQL Server.

microsoft.com/en-us/security/b

Today at 4pm EST, we chat with competitive martial artist, powerlifter, Iron Maiden fan, and motivational Principal PM manager for Defender for Cloud at Microsoft, Yuri Diogenes!

Join us live on one of the following:

LinkedIn: rodtrent.com/8mq

YouTube: rodtrent.com/4iu

Twitch: rodtrent.com/kfe

Or listen in after the show on your favorite podcast network.

www.linkedin.comMicrosoft Security Insights Show Episode 156 - Yuri Diogenes, Principal PM | LinkedInJoin us as we endeavor to tap into Yuri Diogenes' vast knowledge and expertise in navigating the landscape of building a career in cybersecurity.

📢 In a recent report, Microsoft Digital Threat Analysis Center (DTAC) attributes a recent influence operation targeting French satirical magazine Charlie Hebdo to an Iranian nation-state actor, NEPTUNIUM.

💧 In January, a hacker group known as "Holy Souls" claimed to have obtained the personal information of over 200,000 Charlie Hebdo customers. They released a sample of the data, which included full names, telephone numbers, and email and home addresses, putting subscribers at risk of targeting by extremist organizations.

🛡️ To help against these influence operations, DTAC also released their Influence Attribution Framework. This tool helps organizations understand, attribute, and mitigate the impact of these operations. For more information on how the framework works, I've put together a simple infographic that summarizes its key components. 👇 #microsoft #threatintelligence #influence #infosec #cybersecurity #microsoftsecurity

📰 Report: lnkd.in/gwp7Aq9m

⚙ Framework: lnkd.in/gVuv6D8S