Sources & Methods

Monthly newsletter for cyber threat intelligence (CTI) information sources, tools, articles, events, and helpful tips

Avatar designer
smashingstocks
Sources & Methodssrcmtd@infosec.exchange
2024-11-16

Heading into the weekend, here's a new issue of Sources & Methods to mark 2 years of running this CTI newsletter. Thank you for reading, I hope it serves you well! #CTI #threatintel sourcesmethods.com/sources-met

Sources & Methods boosted:
2024-11-16

New @misp playbook! Tackle the week with JARM fingerprint investigations to track threat actor infrastructure using @censys , @shodan and MISP. Boost your #cti game with #automation and #infrastructure insights. github.com/MISP/misp-playbooks

Sources & Methods boosted:
Selena Larsonselenalarson
2024-11-16

New episode of DISCARDED where I chat with @bingohotdog about how she catches phish. ๐ŸŽฃ

We dive into how to write detections, what to hunt for when finding phish kits, and some of her recent research on phishing scams. Tune in wherever you get your podcasts!

Apple: podcasts.apple.com/us/podcast/

Spotify: open.spotify.com/episode/0NpdI

Web: spreaker.com/episode/scams-smi

Sources & Methods boosted:
2024-06-16

Alleged Boss of "Scattered Spider" Hacking Group Arrested in Spain

A 22-year-old man from the United Kingdom arrested this week in Spain is allegedly the ringleader of Scattered Spider, a cybercrime group suspected of hacking into Twilio, LastPass, DoorDash, Mailchimp, and nearly 130 other organizations over the past two years.

krebsonsecurity.com/2024/06/al

#scatteredspider #0ktapus #tylerb #sosa

A still shot from a video released by Spanish national police showing them taking the defendant into custody at a Spanish airport as he tried to get on a flight to Italy.
Sources & Methods boosted:
2024-06-16

Say you, say me. Can it say together? The Natto Team is afraid to say probably not. Cyber attribution is complicated. It looks as if we have more questions than answers after all.

nattothoughts.substack.com/p/w

Sources & Methods boosted:
Lesley Carhart :unverified:hacks4pancakes@infosec.exchange
2024-05-24

My latest blog for SANS is about the importance of and the misunderstandings surrounding threat hunting in industrial networks. sans.org/blog/ot-threat-huntin

Sources & Methodssrcmtd@infosec.exchange
2024-05-24

Power outage during this year's #SLEUTHCON reminds me of #CYBERWARCON 2022 when the same thing happened... โšก๏ธ๐Ÿค” Talks are still being recorded, and thank you to everyone working to get the livestream back!

Sources & Methods boosted:
2024-05-24

Just published the second-longest blog post in my 14 year career as an independent reporter.

This story is the result of a ridiculous amount of research. I hope you like it, because I learned tons reporting this, and there needs to be a broader conversation about some of the issues raised by this research. The lede:

Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and Europe. An investigation into Stark Industries reveals it is being used as a global proxy network that conceals the true source of cyberattacks and disinformation campaigns against enemies of Russia.

krebsonsecurity.com/2024/05/st

Sources & Methods boosted:
2024-05-02

We have compiled our Cyber Brief for the month of April 2024, with a summary of the main IT security developments, reported by open sources. It is available at cert.europa.eu/publications/th.

๐Ÿ”– Policy: EC encourages MS to adopt a unified approach to cryptography-safe digital infrastructure. ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡ฏ๐Ÿ‡ต announce partnerships in AI research. ๐Ÿ‡บ๐Ÿ‡ธ published an advisory on securing election infrastructure against FIMI and charged ๐Ÿ‡ฎ๐Ÿ‡ท nationals for involvement in cyber intrusions.

๐Ÿ•ต๏ธโ€โ™€๏ธ Cyberespionage: reporting of activity by allegedly ๐Ÿ‡ท๐Ÿ‡บ ๐Ÿ‡จ๐Ÿ‡ณ ๐Ÿ‡ฐ๐Ÿ‡ต threat actors. Additionally, Apple alerted iPhone users about potential targeting of a spyware by PSOAs.

๐Ÿ’ถ Cybercrime: top ransomware in ๐Ÿ‡ช๐Ÿ‡บ: Lockbit3, Blackbasta, Akira, Bianlian, and Hunter.
๐Ÿ’ฅ Disruption: ๐Ÿ‡ซ๐Ÿ‡ท a hospital experienced a cyberattack, disrupting operations. Reportedly ๐Ÿ‡ท๐Ÿ‡บ Sandworm and Muddling Meerkat have targeted ๐Ÿ‡ซ๐Ÿ‡ท energy infrastructure and manipulated ๐Ÿ‡จ๐Ÿ‡ณ Great Firewall's DNS responses, respectively. ๐Ÿ‡จ๐Ÿ‡ฟ accused ๐Ÿ‡ท๐Ÿ‡บ of attempting to sabotage European railways.

โ„น๏ธ InfoOps: Reportedly ๐Ÿ‡ท๐Ÿ‡บ ๐Ÿ‡จ๐Ÿ‡ณ disinformation campaigns are heavily targeting ๐Ÿ‡ช๐Ÿ‡บ and ๐Ÿ‡บ๐Ÿ‡ธ elections, ๐Ÿ‡ท๐Ÿ‡บ through social media and fake websites, ๐Ÿ‡จ๐Ÿ‡ณ attempts to influence ๐Ÿ‡บ๐Ÿ‡ธ elections through covert accounts posing as Trump supporters. AI chatbots have inadvertently contributed to misinformation about the ๐Ÿ‡ช๐Ÿ‡บ elections.

Sources & Methods boosted:
2024-05-02

The 2024 Verizon #DBIR is out and it's the Year of the Vuln, as exploit attempts surge + orgs struggle to patch in time. Check out our analysis on the evolving landscape + how GreyNoise helps ID targeted attacks faster + buys remediation time. ๐Ÿฆพ buff.ly/3JJK6WR

Sources & Methods boosted:
Sources & Methodssrcmtd@infosec.exchange
2024-05-01

Here's the April 2024 issue of the Sources & Methods newsletter ๐Ÿ“จ This month, we dive into the importance of collaboration and systems thinking in #CTI, explore the latest updates to MITRE ATT&CK, and ponder the role of analysts in an AI-driven world. We also showcase some exciting new tools for enhancing your CTI workflows and share valuable insights from the community. Enjoy! sourcesmethods.com/sources-met

Sources & Methodssrcmtd@infosec.exchange
2024-04-28

Here's the April 2024 issue of the Sources & Methods newsletter ๐Ÿ“จ This month, we dive into the importance of collaboration and systems thinking in #CTI, explore the latest updates to MITRE ATT&CK, and ponder the role of analysts in an AI-driven world. We also showcase some exciting new tools for enhancing your CTI workflows and share valuable insights from the community. Enjoy! sourcesmethods.com/sources-met

Sources & Methods boosted:
2024-04-28

SANS #OSINT Summit 2024
YouTube playlist

- The Impact of AI with OSINT
- How to Dump Raw Data from TikTok
- Using Astronavigation Techniques to Do Image Geo-Positioning
- Thinking Like a Historian for OSINT Practitioners

and other talks.

youtube.com/playlist?list=PLs4

twitter.com/SANSInstitute

Sources & Methods boosted:
Selena Larsonselenalarson
2024-04-10

On vacation but me n @Ffforward dropped a banger today. TA547 targeting DE with Rhadamanys and a suspected LLM generated powershell script proofpoint.com/us/blog/threat-

Sources & Methods boosted:
2024-04-10

This is an Initial Access Broker with a twist. We like to spotlight important and relevant ATT&CK techniques, so this week weโ€™re taking a look at UNC5174โ€™s N-day exploit spree. Let's go:

Sources & Methods boosted:
2024-04-01

From OneNote to RansomNote: An Ice Cold Intrusion

๐ŸŒŸAnalysis & reporting completed by @iiamaleks, @IrishD34TH, and @Miixxedup

๐ŸŽตAudio (New Voice!): Available on Spotify, Apple, YouTube and more!

๐Ÿ“šReport: thedfirreport.com/2024/04/01/f

๐ŸนServices: thedfirreport.com/services/

#threatintel #dfir #cti #infosec #blueteam

Sources & Methodssrcmtd@infosec.exchange
2024-03-30

GIST: Backdoor Discovered in xz/liblzma Compression Library #CTI sourcesmethods.com/xz-utils-ba

Sources & Methods boosted:
2024-03-30

I'm watching some folks reverse engineer the xz backdoor, sharing some *preliminary* analysis with permission.

The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system().

It's RCE, not auth bypass, and gated/unreplayable.

More details in this thread: bsky.app/profile/did:plc:x2nsu

Sources & Methodssrcmtd@infosec.exchange
2024-03-13
Sources & Methods boosted:
2024-03-09

Behind the doors of a Chinese hacker-for-hire contractor, a tawdry culture of bid-rigging, influence-peddling and alcohol- and sex-fueled customer wooing. By colleagues @dakekang and
@zensoo apnews.com/article/chinese-hac

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst