Cybersecurity Essentials

Mitre ATT&CK

The cybersecurity market already top $100 billion per year and will reach $300 billion by 2024. With that kind of money at stake, this market is one of the hottest areas for IT innovation.

Top news of the week: 15.01.2021.

#threatintelligence
#sunburst
#USCapitol
#SolarWinds
#AllAroundDefender
#SANSBlueTeam

Mitre Attack

@likethecoins shared
On Jan 11, 2021
RT @TheDFIRReport: Trickbot Still Alive and Well ➡️Discovery: AdFind, Nltest, Net, Bloodhound, PowerView ➡️Lateral Movement: SMB, WMI, PS ➡️C2: Trickbot & Cobalt Strike ➡️Credential Access: Ntdsutil & lsass dump ➡️PrivEsc: Named Pipe ➡️Defense Evasion: Trickbot->Wermgr https://t.co/vcQiIsLDyU https://t.co/JcmwrfURw3
Open
Trickbot Still Alive and Well

Trickbot Still Alive and Well

The Trickbot threat actors used Cobalt Strike to pivot through-out the domain, dumping lsass and ntds.dit as they went. They used tools such as AdFind, Nltest, Net, Bloodhound, and ...

@MalwareJake shared
On Jan 11, 2021
Outstanding work by @CrowdStrike detailing the tool that compromised the build process (literally) at SolarWinds. Attackers were in position to change source code, but for stealth, they changed it only during the build process. I'm legitimately impressed. https://t.co/HiPwKMkU1N https://t.co/neUWJ83FId
Open
SUNSPOT: An Implant in the Build Process

SUNSPOT: An Implant in the Build Process

In this blog, we offer a technical analysis of SUNSPOT, malware that was deployed into the build environment to inject this backdoor into the SolarWinds Orion platform.

@PatrickCMiller shared
On Jan 15, 2021
CISA: Hackers bypassed MFA to access cloud service accounts https://t.co/XDS2qmgWdb
Open
CISA: Hackers bypassed MFA to access cloud service accounts

CISA: Hackers bypassed MFA to access cloud service accounts

The US Cybersecurity and Infrastructure Security Agency (CISA) said today that threat actors bypassed multi-factor authentication (MFA) authentication protocols to compromise cloud service ...

@StaySafeOnline shared
On Jan 11, 2021
Executive director @KColemanNCSA shared prevention plans security pros should have in place following the cybersecurity risks due to stolen devices from the #USCapitol with @SecurityWeek https://t.co/b8vfbR0HIV
Open
Experts Weigh In on Cybersecurity Risks of Capitol-Like Attacks

Experts Weigh In on Cybersecurity Risks of Capitol-Like Attacks

Following the recent attack on the U.S. Capitol, where a parade of people stormed the building and gained access to unprotected computers, industry professionals share thoughts on what they ...

@PatrickCMiller shared
On Jan 14, 2021
CISA Warns Organizations About Attacks on Cloud Services https://t.co/2fnRNsRbnC
Open
CISA Warns Organizations About Attacks on Cloud Services

CISA Warns Organizations About Attacks on Cloud Services

The agency says poor cyber hygiene practices lead to compromise via cloud services.

@PatrickCMiller shared
On Jan 11, 2021
Kaspersky Connects SolarWinds Attack Code to Known Russian APT Group https://t.co/ByAQnVNkyA
Open
Kaspersky Connects SolarWinds Attack Code to Known Russian APT Group

Kaspersky Connects SolarWinds Attack Code to Known Russian APT Group

Researchers have found some similarities between the Sunburst malware used in the SolarWinds attack and Kazuar, a backdoor attributed to the Russia-linked cyber-espionage group Turla.

@msftsecurity shared
On Jan 14, 2021
Learn how to use Microsoft 365 Defender and Azure Defender to harden your environment against Solorigate’s attack patterns. Get the guide: https://t.co/6RSZOePfMh @MSFTSecIntel
Open
Increasing resilience against Solorigate and other sophisticated attacks with Microsoft Defender

Increasing resilience against Solorigate and other sophisticated attacks with Microsoft Defender

This blog is a guide for security administrators using Microsoft 365 Defender and Azure Defender to identify and implement security configuration and posture improvements that harden ...

@SANSDefense shared
On Jan 8, 2021
Join @aboutsecurity and @trompi for a Breakout Session - Translating TTPs into Actionable Countermeasures with Virustotal & MITRE ATT&CK #SANSBlueTeam #AllAroundDefender https://t.co/TFvqPxhu3R https://t.co/92LPZfmCtn
Open
Translating TTPs into Actionable Countermeasures with Virustotal & MITRE ATT&CK

Translating TTPs into Actionable Countermeasures with Virustotal & MITRE ATT&CK

Ismael Valenzuela (McAfee/SANS) and Vicente Diaz (Threat Intel Strategist at Virustotal)What are the best practices to make TTPs actionable? How can blue te...