Aura
@SecurityAura
GCIH, GCFE | DFIR, TH, DE | @CuratedIntel DFIR http://github.com/SecurityAura http://infosec.exchange/@SecurityAura http://securityaura.bsky.social
Interesting technique and developing I would say. 2 quick #KQL queries out for #MicrosoftSentinel and #MDE if you want to hunt for it. github.com/SecurityAura/D… Can be adapted to look for cmd.exe probably as well or other interpreters, binaries, etc. Will update as we go.
Observed domains embedding PowerShell commands in their TXT records. @DomainTools @banthisguy9349 @RacWatchin8872 @SquiblydooBlog @skocherhan @500mk500 @volrant136 @smica83
Fun fact: I actually know where that exact PFK is 😂 smoll world (or smoll Québec)
Fun fact: Québec is the only place in the world where KFC is called PFK thanks to the province’s strict french language laws. Even in France, it’s still called KFC… but not in Québec! Because when it comes to language, Québec doesn’t chicken out. 🇨🇦🇫🇷🐔
I don't even speak that language that I know what's going on ❤️ reddit.com/r/PowerShell/s…
For orgs running MDE/Microsoft Defender as primary solution, you basically have another attack surface to cover: 3rd party AV or EDR being installed and registered in the Security Center. Which will put Defender in Passive Mode. Yes, even that bundled AVG Free will do that.
There’s various reports of cybercriminals abusing CrowdStrike RTR, the SentinelOne installer, and the Wazuh SIEM Agent. Seems we could do with a new @MITREattack TTP for this threat. Should be a concern for orgs running any of type of EDR/SIEM agents. (Sources linked below)
>enabling SSH on the ESXi hosts You ARE syslogging your ESXi hosts to a SIEM and alerting on this behavior aren't you? If not, you ARE alerting on the root account password being reset, right? Right? ... Right? Please say I'm right.
this part is brutal.
Meme'ing aside, do not underestimate the power of naming conventions for stuff such as systems, accounts, services, tasks, etc. There is SO many detection and/or hunting possibilities you can/could unlock if you were to just ... name things properly.
More art than science.
Looks like it was the perfect time to start my 6 weeks summer vacation. Not that I would've seen much action, all our clients using Microsoft 365 and all 😞
Hey @grok is looking for indicators of compromise (IOCs) in a SIEM or EDR considered Threat Hunting, or not?
Alright, enough playing around, time to get to the main course. @grok Who are the top 10 InfoSec shitposters on X?
I thought Twitter/X was a safe space from the B2B SaaS LinkedIn stuff. Where will I go now.
@joeflateau Based on analysis of recent X discussions on affordable auth solutions and SaaS building, here are 25 top prospects for your B2B SaaS auth company: @SecurityAura, @kiwicopple, @bug_less, @gregberge_, @pilcrowonpaper, @allthenticate, @ritakozlov_, @devabram,…