Saltmyhash
Saltmyhash boosted:
Christoffer S.nopatience@swecyb.com
2025-06-28

I love how statements like:

"Currently, there is no evidence to suggest exploitation of CVE-2025-5777."

... is NOT comforting at all. It pretty much sounds just like... "we found NO vulnerabilities in our LLM-generated application".

... and how on earth would Netscaler see targeted exploitation? Exactly... Netscaler wouldn't, you might however with appropriate monitoring.

netscaler.com/blog/news/netsca

#CitrixBleed2 #CVE_2025_5777 #Cybersecurity

2025-06-28

@nopatience Exactly. Can’t have evidence of exploitation if you don’t have the logs to see it. I hate weasel words in wordsmithed bulletins written by lawyers.

2025-06-28

Devils Haircut Stylist by Beck #MicroBusinessASongOrPoem
#HashTagGames

Saltmyhash boosted:
2025-06-26

New from 404 Media: ICE is using a new facial recognition app to identify people, leaked emails show. Point camera at person, reveal their identity. It uses the CBP system that records peoples' faces as they enter or exit the U.S. Now, turned inwards to be used by ICE 404media.co/ice-is-using-a-new

2025-06-25

Pulaski at Night by Andrew Bird #CityPerksSongsOrPoems
#HashTagGames

2025-06-25

@codinghorror Awesome and fun build. Where did you buy the lighting? I can’t justify paying 100 bucks for the Milky Way galaxy lighting from lightmybricks.com.

Saltmyhash boosted:
2025-06-25

One of my daughters did all the work on this one! Hell, why not, let’s build the entire frickin Milky Way Galaxy, should only take 6 to 8 weeks

Saltmyhash boosted:
CatSalad🐈🥗 (D.Burch) :blobcatrainbow:catsalad@infosec.exchange
2025-06-25

Huh. I wonder who that is for?

Sort of the bee hovering right next to a piece of paper taped to the side of a board on some posts. On the paper is a drawning of a bee with the prohibit symbol circled and crossed out over it.
Saltmyhash boosted:
Chris Sanders 🔎 🧠chrissanders88@infosec.exchange
2025-06-25

When folks casually reference ATT&CK IDs instead of the technique name...

"Looks like some T1547.001"

Bless your heart, nobody is memorizing all those.

Saltmyhash boosted:
Chris Sanders 🔎 🧠chrissanders88@infosec.exchange
2025-06-24

Investigation Scenario 🔎

A macOS system performed a DNS query for a .onion domain.

The system doesn't have an EDR available -- only native logging.

What do you look for to investigate whether an incident occurred?

#InvestigationPath #DFIR #SOC

2025-06-24

Alibaba O’Riley by The Who #GenericKnockOffSongsOrPoems
#HashTagGames

Saltmyhash boosted:
CatSalad🐈🥗 (D.Burch) :blobcatrainbow:catsalad@infosec.exchange
2025-06-24

Important Message

due to not wanting to, i will not. thanks.

Vaperwave style image a someone sleeping in a bed that has a slight golden glow to it white suspended on a background of blue with poorly drawn stars.
Saltmyhash boosted:
An illustration of a bunch of catfish and koi swimming in greenish murky waters. The bright orange red of the koi contrasts the darker purplish tone of the catfish, their thrashing creates ripples on the surface of the water and the sun scatters bright spotted highlights across the pond.
Saltmyhash boosted:
cR0w :cascadia:cR0w@infosec.exchange
2025-06-20

@saltmyhash Probably.

A source working with Aflac on the incident explained explained that the threat actors did not identify themselves but the characteristics of the attack bear the hallmarks of Scattered Spider

therecord.media/aflac-cyberatt

Saltmyhash boosted:
Chris Fletch :pentagram:HailsandAles@metalhead.club
2025-06-20

Hello #Fediverse it is once again #NewMusicFriday and time for #FletchsFridayReleases. As mentioned, a slightly shorter list this week but that doesn’t mean there isn’t gold in them there hills. #Metal #HeavyMetal #DeathMetal #BlackMetal #ThrashMetal #DoomMetal

hailsandales.club/weekly-relea

Cryptopsy - death - Canada
Sodomic Baptism - death - Belarus
Abruptus - death - Mexico
Porkfarm - death - UK
Diaclast - tech death - Russia
Haggus - grind - USA
Küntsquad - death/crust - Australia
Alkema - death/doom - Sweden
Nihili Locus - death/black - Italy
Patristic - death/black - Italy
Imha Tarikat - black - Germany
Returning - black - USA
Betelgeuse - black - Chile
Skjolden - black - USA
Witherer - black - Canada
Helheim - black - Norway
Tenebrae in Perpetuum - black - Italy
Varhara - black/post - Russia
Glory - black/dungeon synth - AustriaBarren Altar - black/doom - USA
Lucille - thrash - Poland
Herzoga - thrash - Poland
Morbyda - speed - Germany
Angel of Damnation - doom - Germany
The Medea Project - doom/sludge/goth - UK
Skräcken - heavy metal - Sweden
Reflection - heavy metal - Greece
Helms Deep - heavy metal - USA
Warhog - heavy/groove - USA
Leverage - heavy/power - Finland
Ravine - sludge/groove - USA
Malevolence- groove/metalcore - UK
Black Majesty - power - Australia
Itinerum - symphonic - Spain
Death Pill - hardcore - Ukraine
Hiroe - post rock - USAEPs:
WOAT - death/powervoilence - Germany
Etnom - black - Italy
Valdrin - black - USA
Rotgut - black/thrash - USA
2025-06-20

@HailsandAles Cryptopsy’s An Insatiable Violence shortlisted for metal album of the year for me. Only complaint is it’s 33 min long. Highly recommended.

Saltmyhash boosted:
Dr. Victoria Grinbergvicgrinberg
2025-06-19

@acb like this?

A black & white digital drawing (made by me) of a raccoon in a trash bin saying "yes, we are made ot stardust. but so is garbage."
Saltmyhash boosted:
Chris Sanders 🔎 🧠chrissanders88@infosec.exchange
2025-06-18

Investigation Scenario 🔎

A host on your network executed a process whose parent process is mftrace.exe.

What do you look for to investigate whether an incident occurred?

#InvestigationPath #DFIR #SOC

2025-06-18

@chrissanders88 mftrace.exe is a legitimate trace log generation tool but is considered a living-off-the-land binary on Windows OS. Specifically, it allows for proxy execution of binaries which is a technique frequently used by threat actors. These utilities are signed with legitimate certificates that allow them to execute on a system and proxy execution of malicious code through a trusted process that effectively bypasses application control solutions. Knowing this, analysts should carefully investigate the child process of mftrace.exe, understanding that its usage may be benign.

First, I would ensure mftrace.exe is being executed out of its typical Windows file directory and not an attacker-controlled location. The LOLBAS project lists the following execution paths for mftrace.exe. Any execution outside of the standard Windows location warrants scrutiny as to how mftrace.exe got there in the first place.

Paths:
C:\Program Files (x86)\Windows Kits\10\bin\10.0.16299.0\x86\mftrace.exe
C:\Program Files (x86)\Windows Kits\10\bin\10.0.16299.0\x64\mftrace.exe
C:\Program Files (x86)\Windows Kits\10\bin\x86\mftrace.exe
C:\Program Files (x86)\Windows Kits\10\bin\x64\mftrace.exe

Next, closely examine the spawned child process, looking for file hash hits in threat intelligence platforms or suspicious child process spawns, network connections, registry edits, or file modification events. I would also determine how the child process was initially spawned. Finally, I would examine the host this is occurring on and who it belongs to. Context on whose host this belongs to is also a useful indicator. Developers may call mftrace.exe for legitimate event tracing for windows (ETW) activities. Seeing mftrace.exe execution on an unusual host such as accounting or the help desk warrants additional scrutiny.

Detection Opportunities:
Depending on the frequency of mftrace.exe execution in your environment, you might want to monitor for any time mftrace.exe executes a payload. A sample Sigma rule (see below) provides a decent jumping-off point for custom detection logic.

References:

LOLBAS Entry for mftrace.exe:
lolbas-project.github.io/lolba

Sigma Rule for suspicious mftrace execution:
github.com/SigmaHQ/sigma/blob/

MITRE Map:
T1127: Trusted Developer Utilities Proxy Execution
attack.mitre.org/techniques/T1

#soc #dfir #threatintelligence

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst