#XENOTIME

2022-12-19

We're getting into "silly season" at the end of the year. With that in mind, I've thought about the things I did in 2022 that I found most interesting, helpful, or potentially impactful.

First, there's the paper on #CTI-driven #ThreatHunting I wrote and presented on at several events:
gigamon.com/content/dam/resour

Then, there was my @VirusBulletin paper on the #XENOTIME actor responsible for the #Triton event, which I thought was neat as a deep-dive into organizational relationships that get masked in our tracking a single "adversary:"
virusbulletin.com/uploads/pdf/

On a personal front, I wrote up some prelimianry analysis on the #Industroyer2 attempted (?) #ICS #OT incident as part of the conflict in #Ukraine - and there are still some items raised there for which we don't have answers several months after the incident was discovered:
pylos.co/2022/04/23/industroye

Finally, I wrote a blog for my employer diving into the idea of the #FalsePositive in #DetectionEngineering and #SecurityMonitoring that I think is helpful for analysts from #IR to the #SOC
blog.gigamon.com/2022/08/05/re

I need to think this over a bit, but look for something covering the most insightful work of others, from my perspective, from the past year!

2022-11-29

For the past 2-3 years I've tried to do two long-form research projects each year: one focused on practical #infosec methodologies, the other on #threatresearch #APT activity.

Last year, I did a paper on #CTI-driven #threathunting, and another on #XENOTIME/#Triton entity. That was cool.

Right now, 2023 is looking like:
1. Intelligence-driven approaches to #DetectionEngineering and alerting
2. State-sponsored activity leveraging #ransomware or similar for disruptive #cyber operations

This is subject to change, but this looks like what I'll be diving into right now

2022-11-23

The #OT #ICS threat environment is interesting as, aside from ransomware shit, the threats are latent, dormant, or in development. The evolution of #berserkbear, identification of #INCONTROLLER / #PIPEDREAM, continued #XENOTIME activity, identification of #PRC test labs for cyber physical capabilities... All indicate an environment under rapid development, but with fewer actual public examples than fingers on your hand. Circumstances make risk assessment (and cost forecasting) exceptionally difficult for asset owners... But the adversaries are out there, and as shown in #Industroyer2, they are learning. Claiming adversaries will never figure out a cyber physical attack and that the future threat landscape is over hyped seems unhelpful, or motivated by feelings less than altruistic.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst