#InitialAccess

2025-12-10

High confidence threat activity related to initial access detected targeting the USA 🇺🇸. Details on specific sectors or victims remain unknown. #ThreatIntel #CyberSecurity #InitialAccess

2025-11-29

High-confidence initial access activity detected targeting a business and computer science college in India 🇮🇳. This highlights ongoing threats to education institutions in the region. #CyberThreats #EducationSecurity #InitialAccess

2025-11-12

High confidence detection indicates a recent #InitialAccess attempt targeting Turkey 🇹🇷. Sector and victim details remain unknown. Stay vigilant. #ThreatIntel #CyberSecurity #Turkey

CryptoLek 🍉🌻CryptoLek@infosec.exchange
2025-08-13

A user of DarkForums is selling an initial access to a Finnish video gaming company.

Access Type: SMB
OS: Windows
Revenue: 27.5 Million $
Price: 1,1k (XMR)

#Finland #InitialAccess #InitialAccessBroker #DarkForums

A user of DarkForums is selling an initial access to a Finnish video gaming company. Screenshot from the forum

Access Type:  SMB
OS: Windows
Revenue: 27.5 Million $
Price: 1,1k (XMR)

#Finland #InitialAccess #InitialAccessBroker #DarkForums
2025-04-09

Angreifer greifen immer häufiger zum Hörer statt zur Tastatur. In unserem Webinar zeigen wir, warum Vishing (Voice-Phishing) in der Initial-Access-Phase so erfolgreich ist und wie wir diesen Trend in unseren Red-Team-Exercises nutzen.

Mit dabei:
✅ Live-Einblicke in reale Angriffsszenarien
✅ Technische Infrastruktur hinter den Kulissen
✅ Psychologische Tricks für maximale Wirkung
✅ Effektive Schutzmaßnahmen (technisch & organisatorisch)

Melde dich jetzt an und lerne, wie du dich und dein Unternehmen vor dieser wachsenden Bedrohung schützen kannst!

🎤 Sprecher: Hagen Molzer, Leitender Berater bei cirosec und Projektleiter unseres Red-Team-Assessments.

👉 cirosec.de/news/vishing_phishi

#Vishing #RedTeam #SocialEngineering #CyberSecurity #Webinar #Phishing #InitialAccess #cirosec #Awareness

Angreifer greifen immer häufiger zum Hörer statt zur Tastatur. In unserem Webinar zeigen wir, warum Vishing (Voice-Phishing) in der Initial-Access-Phase so erfolgreich ist und wie wir diesen Trend in unseren Red-Team-Exercises nutzen.
অর্ঘ্য 🏏📚 💻StringsVsAtoms
2025-02-13

’s ‘’ Hackers Exploit for in Telecom —Researchers warn the group is targeting global to spy on data and communications.

🔗 wired.com/story/chinas-salt-ty

2024-01-23

Threat Hunting: Foothold - I have just completed this room @RealTryHackMe! Check it out:

💙Understanding the attacker's mindset in achieving initial access.
💙Correlating succeeding actions executed by an attacker after obtaining a foothold.
💙Differentiating suspicious host and network events from benign ones.
💙Getting acquainted with the MITRE Tactics involved once an attacker gets inside the target organisation.

tryhackme.com/room/threathunti #tryhackme #threathunting #elk #initialaccess

2023-12-31

Red Team Recon - I just finished this room, played around with #reconng and learned a bit about #maltego

#tryhackme #redteaming #initialaccess

tryhackme.com/room/redteamreco

2023-12-06

Spear-phishing. Drive-By Compromise. External Remote Services. These are all techniques commonly leveraged by cybercriminals that appear as routine processes and harmless files or weblinks to the untrained eye. In a new blog, @corelight shares how network evidence—derived from Zeek® data and integrated with @crowdstrike Falcon LogScale—can help security teams detect these techniques, as well as others within the “Initial Access” pillar of the @mitreattack framework. corelight.com/blog/confronting

This blog is the first in a new series where we’ll share tips on how Falcon LogScale users can detect some of the most common adversary techniques described in the MITRE framework using Corelight network evidence. For a full rundown on our complete list, download Corelight’s new Threat Hunting Guide for CrowdStrike Falcon LogScale users at: go.corelight.com/threat-huntin

#ThreatHunting #InitialAccess #MITRE #CrowdStrike #NDR

2023-11-01

The Lay of the Land - I have just completed this room! Check it out: tryhackme.com/room/thelayofthe
#tryhackme #ActiveDirectory #InitialAccess #Network-basedSecuritySolutions #Host-basedSecuritySolutions #thelayoftheland via @RealTryHackMe

R to @enisa_eu: Once the needed resources are ready, #exploitation of #EntryPoints begins to gain a first foothold within the target.

Third phase of #SocialEngineering: #InitialAccess. Learn how to face it!🛑

🔗europa.eu/!rKMC9w #FuelForCyber #CyberSecMonth

🐦🔗: nitter.cz/enisa_eu/status/1714

[2023-10-18 09:04 UTC]

2023-05-15

Introducing the newest major @tidalcyber TTP intelligence content roundup, the Initial Access & Malware Delivery Landscape matrix, now live in our free Community Edition platform: app.tidalcyber.com/share/43836

The matrix covers 25 major & emerging #malware typically used to gain early footholds in victim environments, often leading to ingress of more impactful threats, especially #ransomware, #infostealers, cryptominers, & more. It includes many recognizable names (#QakBot, #IcedID, #Emotet, #Bumblebee, #Gootloader) plus several newer and less-discussed threats

The matrix includes 13 custom Technique Sets for threats not currently tracked in the #mitreattack knowledge base. All technique references derive from a large volume of recent, public #threat reporting (click the labels in the ribbon at the top of the matrix to view relevant source URLs for each threat)

An interactive link analysis visualization of connections among these threats, also derived from public reports, is also available here: onodo.org/visualizations/23506

Community Edition matrices support easy identification of shared (and outlier) techniques among multiple threats, and quick & easy overlay or pivoting to defensive & offensive security capabilities relevant to your own #security stack. We’ll have a blog out soon reviewing our analysis of top & trending techniques common among these initial access threats

Tidal’s #Adversary Intelligence team remains focused on providing up-to-date #TTPintelligence, especially around traditionally under-represented yet widely relevant threats like crimeware. Other popular matrices in this theme include our Ransomware & Data Extortion Landscape matrix (app.tidalcyber.com/share/9a0fd) and Major & Emerging Infostealers matrix (app.tidalcyber.com/share/ec62f), which each cover 20+ threats

Financially motivated adversaries often display a rapid pace of #TTP evolution, and this is especially apparent for #initialaccess threats. Register for our webinar on May 31 dedicated to TTP evolution, its drivers, and discussion around what defenders can do to address it and its implications: hubs.la/Q01NC23k0

#SharedWithTidal #threatinformeddefense #malware #infostealer #cryptominer #IAB #blueteam #detectionengineering #purpleteam #cyber

2023-03-13

The latest Technique Set added to Tidal’s free Community Edition summarizes the TTPs observed in recent #SocGholish campaigns according to public threat reporting app.tidalcyber.com/share/4b901

SocGholish is a highly active, JavaScript-based loader #malware used to deliver a wide variety of impactful threats (summarized in the original visual attached here). Many #ransomware families, the #CobaltStrike post-exploit framework, other remote access trojans (#RAT) and loaders, and tools for #ActiveDirectory enumeration, #detection evasion, and #credential theft have been linked to recent SocGholish campaigns

SocGholish appears on multiple security and #CTI vendors' top priority threat lists. Active since 2017, SentinelLabs researchers observed a 330%+ increase in SocGholish malware-staging servers between the first and second halves of 2022, and Sucuri researchers detected more than 25,000 websites newly compromised by the malware's operators through July 2022 alone. Initial infections predominantly come via file downloads from sites hosting fake web browser updates, although operators use some non-traditional email delivery techniques to drive compromised content towards potential victims. Like many of today's top #initialaccess threats, SocGholish victimology involves a wide range of industries

Consider layering the new set with other recent Community Edition content from @tidalcyber's Adversary Intelligence team, including our recent #Gootloader set (app.tidalcyber.com/share/796ca) or the set of techniques most recently associated with the ever-evolving #QakBot #trojan (app.tidalcyber.com/share/aef0f), into one view to compare & contrast initial access techniques (app.tidalcyber.com/share/adb95). Then take it a step further by layering mappings from your own defensive stack with the list of capabilities available in the Product Registry (app.tidalcyber.com/vendors). And stay tuned for our soon-to-be published overview matrix on the broad initial access/malware delivery ecosystem in today’s threat landscape, featuring more threats like the ones seen here

#threatinformeddefense #SharedWithTidal

2023-02-21

#Gootloader is a highly active banking Trojan-turned-loader #malware that has recently appeared on multiple vendors’ priority threat lists, attacking organizations in a wide range of verticals & countries. If your leadership or other stakeholders asked for a list of this threat's most common TTPs, would you be able to provide it quickly?

Now you can, with the Gootloader #TTP matrix available in Tidal’s free Community Edition: app.tidalcyber.com/share/796ca

Gootloader, also referred to by its related payload, #Gootkit, first emerged in 2014 but has been especially active since 2020. Despite this, technical reporting around its TTPs has been relatively light until even more recently. In the past two years alone, verticals including finance, #healthcare, defense, pharmaceutical, energy, & automotive have faced Gootloader campaigns, with victims across North America, Western Europe, & South Korea, and the malware is regularly used to deliver high-impact payloads, including Cobalt Strike, #IcedID (a common #ransomware precursor), & more. Industry-based #threat profiling can be a powerful tool, but even if your industry (or your corner of it) hasn’t yet directly observed Gootloader activity, we believe broad-based threats like this should be on most teams’ radars

Our matrix summarizes Gootloader TTPs detailed across several great recent technical reports. Reports from SentinelLabs, Cybereason, & The DFIR Report were helpfully pre-mapped to #mitreattack, and we mapped a couple other detailed analyses. Procedural details are even available for nearly all the included technique mappings – be sure to click the Technique Set’s label in the ribbon at the top of the screen to pivot into the Details page with this information & relevant source links throughout

Red Canary & The DFIR Report helpfully provided tool-agnostic suggested #detection logic for key behaviors observed during recent Gootloader campaigns here redcanary.com/blog/gootloader/ and here thedfirreport.com/2022/05/09/s. Take a wider view by layering entire segments of your defensive stack over the #CTI back in the Community Edition, by toggling on any of the mappings available in @tidalcyber's Product Registry app.tidalcyber.com/vendors

#SharedWithTidal #threatinformeddefense #CobaltStrike #initialaccess #blueteam

2023-01-26

How attackers evade endpoint defenses and install and execute "rigged" remote management software without having admin privileges

helpnetsecurity.com/2023/01/26

#Cybersecurity #InitialAccess #Cybercrime

Grabbing hand

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst