p0 Labs (@p0labs) 's Twitter Profile
p0 Labs

@p0labs

Cloud Threat Research and Detection Engineering is our Priority Zero (p0) at Permiso Security.

ID: 1506319063261368328

linkhttps://permiso.io/blog calendar_today22-03-2022 17:18:23

34 Tweet

106 Followers

32 Following

Daniel Bohannon (@danielhbohannon) 's Twitter Profile Photo

I'm super excited to announce that I've joined Permiso Security as a Principal Security Researcher! Stoked to be reunited with the fiercely fun & technical 1aN0rmus on the p0 Labs research team. Several weeks in & I'm super impressed by the team, tools, data & capabilities.

I'm super excited to announce that I've joined <a href="/permisosecurity/">Permiso Security</a> as a Principal Security Researcher!

Stoked to be reunited with the fiercely fun &amp; technical <a href="/TekDefense/">1aN0rmus</a> on the <a href="/P0Labs/">p0 Labs</a> research team. Several weeks in &amp; I'm super impressed by the team, tools, data &amp; capabilities.
Nick Carr (@itsreallynick) 's Twitter Profile Photo

.1aN0rmus & the Permiso Security p0 Labs team get it. This time showing you how older techniques like HIST* mods can be combined with new signal to hunt for credential harvesting campaigns $hist1 = "HISTSIZE=0" $hist2 = "unset HISTFILE" 🆕 permiso.io/blog/s/christm… 🎅

p0 Labs (@p0labs) 's Twitter Profile Photo

Checkout some of the great research from the Permiso Security p0 Labs team from last year: 1. #Okta Impersonation: permiso.io/blog/s/down-wi… 2. Anatomy of an #AWS attack: permiso.io/blog/s/anatomy… 3. #Cloud Cred Harvesting: permiso.io/blog/s/christm… ... and more!

Checkout some of the great research from the <a href="/permisosecurity/">Permiso Security</a> <a href="/P0Labs/">p0 Labs</a> team from last year:
1. #Okta Impersonation: permiso.io/blog/s/down-wi…
2. Anatomy of an #AWS attack: permiso.io/blog/s/anatomy…
3. #Cloud Cred Harvesting: permiso.io/blog/s/christm…
... and more!
Noah McDonald (@theiceroot) 's Twitter Profile Photo

Permiso Security & Expel both writing a blog within a week of each other explaining how threat actors are exploiting the Simple Email Service (SES) within #aws. Please read and learn from these articles! permiso.io/blog/s/aws-ses… #cloud #threatdetection

Marco Lancini (@lancinimarco) 's Twitter Profile Photo

🔖 Cloud Cred Harvesting Campaign A credential harvesting campaign targeting cloud infrastructure. The majority of the victim system were running public facing Juptyer Notebooks. From Permiso Security permiso.io/blog/s/christm…

Marco Lancini (@lancinimarco) 's Twitter Profile Photo

🔖 SES-pionage What do attackers do with exposed AWS access keys? This blog looks inside AWS SES to give deeper insights into the service, why &amp; how its targeted and how to detect it. From Permiso Security permiso.io/blog/s/aws-ses…

1aN0rmus (@tekdefense) 's Twitter Profile Photo

Compromised Access Keys aren't the only vector for #cloud Attacks. Checkout our (Permiso Security ) latest article where we detail an ongoing wateringhole attack targeting #AWS management console users via #google ads. permiso.io/blog/s/waterin…

1aN0rmus (@tekdefense) 's Twitter Profile Photo

2022 was a great year for the Permiso Security p0 Labs team. Hundreds of hours dedicated to researching, detecting, and helping our clients responds to #cloud attacks. Here are some of our observations: permiso.io/blog/s/permiso…

1aN0rmus (@tekdefense) 's Twitter Profile Photo

Last week we Permiso Security wrote an article permiso.io/blog/s/waterin… speaking to a #google ads phishing campaign targeting #brazilian #AWS users. Tom Hegel discovered the next phase of the attackers campaign, catch the details from the SentinelOne team sentinelone.com/blog/cloud-cre…

1aN0rmus (@tekdefense) 's Twitter Profile Photo

Keep an eye out for usage of deprecated #AWS policies. Bleon Proko makes his Permiso Security p0 Labs blog debut talking about the dangers of the deprecated policy AmazonEC2RoleforSSM permiso.io/blog/s/depreca…

1aN0rmus (@tekdefense) 's Twitter Profile Photo

Here Permiso Security the focus is on detection of #identity and #cloud threat activity. #Detection can be an art form with various methodologies. In this article we describe our approach to detection using AndroxGh0st and GreenBot as an example! permiso.io/blog/s/approac…

SentinelLabs (@labssentinel) 's Twitter Profile Photo

New joint release with our friends at Permiso Security / p0 Labs 👇 AWS-Targeting Cred Stealer Expands to Azure, GCP 💜 s1.ai/cloudcreds 💜 permiso.io/blog/s/agile-a… Alex Delamotte 1aN0rmus Daniel Bohannon #ThreatIntel

1aN0rmus (@tekdefense) 's Twitter Profile Photo

Beware of LUCR-3! 🚨 Threat actor that overlaps with Scattered Spider, Oktapus, UNC3944, & STORM-0875, they exploit IDPs for initial access & aim to steal IP for extortion. They use victims' tools and evade detection with expertise. Permiso Security permiso.io/blog/lucr-3-sc…

Nick Carr (@itsreallynick) 's Twitter Profile Photo

Excellent 🆕blog from Permiso Security on the most disruptive criminal intrusion set we're all working on. Blog details evasive techniques scattered across SaaS & multi-cloud environments.

Excellent 🆕blog from <a href="/permisosecurity/">Permiso Security</a> on the most disruptive criminal intrusion set we're all working on. Blog details evasive techniques scattered across SaaS &amp; multi-cloud environments.
Nick Carr (@itsreallynick) 's Twitter Profile Photo

đź“´Hopefully your org doesn't allow SMS for 2FA (especially for privileged accounts in Azure AD). Don't stop at disabling it. Monitor for threat actors trying to modify it. Nice transparency into threat actor tampering & recommendations 1aN0rmus/p0 Labs đź“°Full blog:

đź“´Hopefully your org doesn't allow SMS for 2FA (especially for privileged accounts in Azure AD).

Don't stop at disabling it. Monitor for threat actors trying to modify it. Nice transparency into threat actor tampering &amp; recommendations <a href="/TekDefense/">1aN0rmus</a>/<a href="/p0Labs/">p0 Labs</a>
đź“°Full blog:
Melinda Marks (@melindamarks) 's Twitter Profile Photo

An area needing attention for protecting modern applications against threats👇 -access via IDP identities -LUCR-3 uses SaaS applications to learn how the victim organization operates and how to access sensitive information."  #cloudsecurity #iam #sspm #appsec Permiso Security