#threatHunting

2025-05-29

This blog is a little bitter, but it's what it is🫠

Detecting Vulnerable Drivers (a.k.a. LOLDrivers) the Right Way

academy.bluraven.io/blog/detec

#ThreatHunting #DetectionEngineering

:sm64_d: :sm64_l: :sm64_i: :sm64_l: :sm64_j: :sm64_a:dlilja@infosec.exchange
2025-05-29

New post in the Logwatcher's Zenit category has been published. It's the first part about how VS Code is a great tool for Cyberthreat Analysts. We're starting with key commands to speed up the workflow.

#threathunter #threathunting #threatanalysis #cybersecurity #blog

threathunter-chronicles.medium

Just Another Blue TeamerLeeArchinal@ioc.exchange
2025-05-28

Happy Wednesday everyone!

I stumbled across this interesting report from Flare that took an in-depth look at the relationship between Session Hijacking and Account Takeovers. The article put into perspective how lucrative and common these attacks are and really helped me understand the threat by providing a bunch of contextual information. I enjoyed it and hope you do too! Happy Hunting!

The Account and Session Takeover Economy
flare.io/learn/resources/the-a

Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday

:sm64_d: :sm64_l: :sm64_i: :sm64_l: :sm64_j: :sm64_a:dlilja@infosec.exchange
2025-05-28

My first post is up on my new blog, ThreatHunter Chronicles. It mainly just describes what I want to publish on the blog and what you can expect.

The first post in the Logwatcher’s Zenit category is scheduled at 10am CEST tomorrow (29th of May).

medium.com/@threathunter-chron

#cybersecurity #threathunting #blog

Just Another Blue TeamerLeeArchinal@ioc.exchange
2025-05-27

Good day everyone!

If you are in the threat hunting community, want to join, or simply have questions regarding threat hunting, we at Intel 471 want to hear them! Toss us your questions to possibly get featured in our new series "Lee-Git Threat Hunting: Your Questions, Answered"! Simply put your question in the form and add your name if you want! I look forward to seeing them! Enjoy and Happy Hunting!

docs.google.com/forms/d/1fYIKF

Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting

Otavio Augustooaugustopro
2025-05-24

Honored to be part of Cyber Spartan 24 🇬🇧, the UK’s top cyber defense exercise! Joined Blue Teams from 🇧🇷🇮🇹🇩🇪🇵🇱🇧🇳 in a live cyber war scenario with threat hunting, SIEM, system hardening & Hack Back ops. Amazing challenge, global scale 💻⚔️
Grateful for the opportunity and to God for guiding every step 🙏

Just Another Blue TeamerLeeArchinal@ioc.exchange
2025-05-23

Happy Friday everyone!

With the news breaking that the #DanaBot was disrupted, it got me thinking: How do these pieces of malware function and how do they stay on the victim's machines? And when you think of what a botnet operator really needs is repeated access to the compromised machine which gets me thinking about persistence. So, I poked around my favorite resources, the MITRE ATT&CK Matrix, looked at as many bot malware they have, and looked at what they had in common from a perspective of persistence. Two of the most common techniques used were T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder and T1053.005 - Scheduled Task/Job: Scheduled Task. So, if you are hunting for bots, you may want to start there! Enjoy the read and Happy Hunting!

DanaBot malware disrupted, threat actors named
intel471.com/blog/danabot-malw

Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday

𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲netresec@infosec.exchange
2025-05-22

Thank you CISA, NCSC, @bsi et al. for publishing the advisory on Russian GRU Targeting Western Logistics Entities and Technology Companies. This list of mocking services is great for threat hunting!
#threathunting #threatintel

Many organizations may not need to allow outgoing traffic to hosting and API mocking
services, which are frequently used by GRU unit 26165. Organizations should consider
alerting on or blocking the following services, with exceptions allowlisted for legitimate
activity [D3-DNSDL].
 *.000[.]pe
 *.1cooldns[.]com
 *.42web[.]io
 *.4cloud[.]click
 *.accesscan[.]org
 *.bumbleshrimp[.]com
 *.camdvr[.]org
 *.casacam[.]net
 *.ddnsfree[.]com
 *.ddnsgeek[.]com
 *.ddnsguru[.]com
 *.dynuddns[.]com
 *.dynuddns[.]net
 *.free[.]nf
 *.freeddns[.]org
 *.frge[.]io
 *.glize[.]com
 *.great-site[.]net
 *.infinityfreeapp[.]com
 *.kesug[.]com
 *.loseyourip[.]com
 *.lovestoblog[.]com
 *.mockbin[.]io
 *.mockbin[.]org
 *.mocky[.]io
 *.mybiolink[.]io
 *.mysynology[.]net
 *.mywire[.]org
 *.ngrok[.]io
 *.ooguy[.]com
 *.pipedream[.]net
 *.rf[.]gd
 *.urlbae[.]com
 *.webhook[.]site
 *.webhookapp[.]com
 *.webredirect[.]org
 *.wuaze[.]com
Heuristic detections for web requests to new subdomains, including of the above
providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for
each sub-domain requested by users on a network, such as in DNS or firewall logs,
may enable system administrators to identify new targeting and victims
Just Another Blue TeamerLeeArchinal@ioc.exchange
2025-05-22

Good day everyone!

I don't know how I missed this one but here is your #readoftheday:

The DFIR Report published an article on Monday that details an attack that started with a vulnerable Confluence server and ended with the deployment of the ELPAC-team ransomware. There were multiple tools that were used that are publicly available, including Anydesk.exe, Mimikatz, ProcessHacker, and Impacket Secretsdump. Side note, they mention that this case is featured in one of their labs, so go check it out! Also, go find out all the details that I couldn't post here and read the article! Enjoy and Happy Hunting!

Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware
thedfirreport.com/2025/05/19/a

Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting

Just Another Blue TeamerLeeArchinal@ioc.exchange
2025-05-21

Happy Wednesday!

Today's #readoftheday is an article from Sophos researchers provide details on an attack that involved the #3AM ransomware strain. With what started with email-bombing, led to social engineering and Microsoft Quick Assist, and a Windows 7 virtual machine. What I really enjoy about this article is the technical details about the "pre-ransomware" activity which can be seen in the Discovery and Defense Evasion sections. These normally involve some LOLBINs (Living-Off-The-Land Binaries) and use the tools that can help provide the adversary with information about the system. Enjoy and Happy Hunting!

A familiar playbook with a twist: 3AM ransomware actors dropped virtual machine with vishing and Quick Assist
news.sophos.com/en-us/2025/05/

Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting

2025-05-20

Got that hunger for #ThreatHunting again. Thinking about buying a month of Xintra Labs again. :blob_grinning_sweat:

Or should I go hunting #TanJangLin's work in the wild. :blob_gnikniht:

abuse.ch :verified:abuse_ch@ioc.exchange
2025-05-20

#ItsNewFeatureTuesday! (That’s a thing, right?) 😎
You can now share searches with 3rd parties without them needing to authenticate to view the results! It’s a neat feature that will save time and hassle.

Here's how it works ⤵️
1) User (authenticated!) searches on hunting.abuse.ch
2) Click the "share" button next to the search button
3) This creates a unique link and copies it to clipboard, for example:
hunting.abuse.ch/hunt/68274cdc

✨ Ta da! Any user with this link can see these results without the need to authenticate!

Happy Hunting (and sharing) enjoy! 🫶

#SharingIsCaring #ThreatIntel #ThreatHunting #CTI

New feature for hunting.abuse.ch
2025-05-18

Quick Guide to Open-Source Intelligence 🔎🌍🕵️‍♂️

Open-Source Intelligence (OSINT) is the art of gathering publicly available information for research, investigation, or cyber defense.

Why it matters:
OSINT is essential for cyber defense, threat hunting, and digital investigations — when used ethically and legally.

Disclaimer: This content is for educational and ethical use only. Always respect privacy laws and platform terms of service.

#OSINT #OpenSourceIntelligence #CyberSecurity #InfoSec #EducationOnly #DigitalInvestigation #ReconTools #ThreatHunting #PrivacyAwareness

2025-05-17

🛠️ Cyberbro has now a #MISP connector!

Use your MISP events to check observables:

- last seen
- first seen
- top 5 latest MISP events
- Research link in MISP

#ioc #cti #threathunting

⬇️⬇️⬇️

github.com/stanfrbd/cyberbro/

Poke @misp @circl

image of cyberbro report with MISP integrationimage of cyberbro report with MISP integration
2025-05-17

It's one of those rare moments in time when exposing the Yekaterinburg's based Plastika Recording Studio which is the primary advertising and marketing creative supplier for the Conti #Ransomware Gang is the right thing to do. Is it Никита Жаринов, Евгений Самсонов, Ice Costa or W8D8digital? We have it all named researched and properly sorted out.

So here it goes. This is my EXIF and attribution reproduction analysis based on their originally leaked and publicly accessible internal communication - archive.org/download/rewards-f [PDF] here's more - dn721806.ca.archive.org/0/item [PDF] here's more - here's more - dn721806.ca.archive.org/0/item [PDF] here's more - dn721806.ca.archive.org/0/item [PDF] here's most - dn721806.ca.archive.org/0/item [PDF] here's more - dn721806.ca.archive.org/0/item [PDF] and here's even more - dn721806.ca.archive.org/0/item [PDF].

Here's the actual connection.

Conti -> Plastika -> +7 (992) 004-54-45 -> Yekaterinburg, Kirova Street, 9 -> yandex.eu/maps/org/plastika/22 -> vk.com/plastika.space -> plastika.space/ -> W8D8digital -> vk.com/id452512822 -> icecostabeats.connect@gmail.com -> t.me/icecostabeats -> instagram.com/icecosta/ -> vk.com/kidsocial -> vk.com/eugene_creative_power -> vk.com/icecosta -> vk.com/lungo999 -> vk.com/icecostabeats

and here's my YouTube video reproduction analysis - youtube.com/watch?v=ILgaZfcRww4 and here's the full research - archive.org/details/rewards-fo

#security #cybercrime #malware #CyberSecurity #cybersécurité #DataProtection #SecurityOperations #securitySystems #security_compliance #security_research #securitynews #securitybreach #cyberattack #CyberFraud #threatintel #threatintelligence #threathunting

2025-05-17

New weekend-hobby-idea (after gifting Lumma C2 Steam-Accounts Reward-Stickers):

Tracing Mastodon-Accounts to APT-Tool-Devs.

#threatintel #APT #threathunting

2025-05-16

Here's a little svchost tip:
If you ever looked at an svchost process and wondered what something like C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc means:

-k runs a group of services. A request is made to HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost

-p turns on process mitigation policies

-s runs a specific service from a group (so wscsvc is a service within LocalServiceNetworkRestricted)

#ThreatHunting #Infosec

2025-05-16

KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules🕵️‍♂️

github.com/Bert-JanP/Hunting-Q

#infosec #cybersecurity #threatintel #threathunting #azure #sentinel #kql

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst