Wojciech Cieślak (@bodziurity) 's Twitter Profile
Wojciech Cieślak

@bodziurity

Opinions are my own.

ID: 1386587292878393345

calendar_today26-04-2021 07:45:54

29 Tweet

59 Takipçi

45 Takip Edilen

Wojciech Cieślak (@bodziurity) 's Twitter Profile Photo

Possibly good hunting/dfir artifact?🤔 Htm file dropped to Temporary Internet Files directory, VT Livehunt gives me solid results (running for 2 hr). #CVE202140444

Possibly good hunting/dfir artifact?🤔
Htm file dropped to Temporary Internet Files directory, VT Livehunt gives me solid results (running for 2 hr). 
#CVE202140444
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Sigma rule to detect file creation pattern as noticed in CVE-2021-40444 exploitation Report by Ronny x.com/RonnyTNL/statu… Sysmon config change github.com/Neo23x0/sysmon… Sigma rule github.com/SigmaHQ/sigma/…

Sigma rule to detect file creation pattern as noticed in CVE-2021-40444 exploitation 

Report by <a href="/RonnyTNL/">Ronny</a>
x.com/RonnyTNL/statu…

Sysmon config change
github.com/Neo23x0/sysmon…

Sigma rule
github.com/SigmaHQ/sigma/…
Wojciech Lesicki (@wlesicki) 's Twitter Profile Photo

Interesting report about #cobaltstrike . We have here both what techniques are used by threat actors, but also how to emulate them. And, of course, detect. I’m very pleased that the Sigma rule created by Florian Roth ⚡️ and me was mentioned.

Interesting report about #cobaltstrike .
We have here both what techniques are used by threat actors, but also how to emulate them. And, of course, detect.
I’m very pleased that the <a href="/sigma/">Sigma</a> rule created by <a href="/cyb3rops/">Florian Roth ⚡️</a> and me was mentioned.
The DFIR Report (@thedfirreport) 's Twitter Profile Photo

Cobalt Strike, a Defender's Guide - Part 2 ➡️In this report we talk about domain fronting, SOCKS proxy, C2 traffic, Sigma rules, JARM, JA3/S, RITA & more. Big shout-out to Kostas for helping put this together! thedfirreport.com/2022/01/24/cob…

Cobalt Strike, a Defender's Guide - Part 2

➡️In this report we talk about domain fronting, SOCKS proxy, C2 traffic, Sigma rules, JARM, JA3/S, RITA &amp; more.

Big shout-out to <a href="/Kostastsale/">Kostas</a> for helping put this together! 

thedfirreport.com/2022/01/24/cob…
Vitali Kremez (@vk_intel) 's Twitter Profile Photo

One more down: 👇"bentley aka "Max Galochkin" aka "volhvb" aka Conti ransomware group technical lead - his unique alias "volhvb" logged into RaidCall via his own YouTube video youtube.com/watch?v=K2OmGB… ➡️into alias "volhvb" in Conti chats

One more down: 👇"bentley aka "Max Galochkin" aka "volhvb" aka Conti ransomware group technical lead - his unique alias "volhvb" logged into RaidCall via his own YouTube video  youtube.com/watch?v=K2OmGB…
➡️into alias "volhvb" in Conti chats
Wojciech Cieślak (@bodziurity) 's Twitter Profile Photo

This is a good #Shodan exercise and if you look closely you'll see that one of the TAs is a prankster. But the joke's on him, you can #Rickroll to find additional malicious infrastructure 🕺 x.com/MichalKoczwara…

This is a good #Shodan exercise and if you look closely you'll see that one of the TAs is a prankster. But the joke's on him, you can #Rickroll to find additional malicious infrastructure 🕺
x.com/MichalKoczwara…
Wojciech Cieślak (@bodziurity) 's Twitter Profile Photo

We just released a new research about #Rilide Stealer on #SpiderLabs Blog. It features new functionalities, adaptation to Google Chrome Manifest V3 and some interesting in the wild campaigns 🔥 trustwave.com/en-us/resource…