Max Rogers (@maxrogers5) 's Twitter Profile
Max Rogers

@maxrogers5

Sr. Director of SOC at Huntress. Ex-Mandiant/FireEye. Bringing security to the Fortune 5,000,000.

ID: 457368684

calendar_today07-01-2012 10:00:22

1,1K Tweet

3,3K Followers

1,1K Following

Tanner (@wbmmfq) 's Twitter Profile Photo

I've seen a program called "Let's Compress" being used on some hosts lately. It looks like a wrapper for 7zip with ads, nbd, but the updater is what's got me concerned. ๐Ÿงต

Tanner (@wbmmfq) 's Twitter Profile Photo

Today we observed a threat actor use an executable that was built with Graal to run enumeration and deploy NetSupport to a host. I have not personally seen this before - I'll post a thread later, hopefully, because it was a lot more interesting than I expected.

Stephanie Fairless (@blackshadow676) 's Twitter Profile Photo

Hi Everyone I have created a website for anyone who is interested in cyber security. This has information on courses I have completed and found informative, information on tools that we use and other helpful information. Url - stephaniefairless.com Huntress Max Rogers

Matt Anderson (@nosecurething) 's Twitter Profile Photo

New @huntress blog where alden Greg Linares (Laughing Mantis) and I tell the story of ๐Ÿ•ต๏ธand ๐Ÿคœ โžก๏ธ๐Ÿ—‘๏ธ some cyber espionage activity in 2024. Always feels good to learn something interesting and then use it to stop real threats with our team at Huntress! ๐Ÿ’ชhuntress.com/blog/the-hunt-โ€ฆ

Jai Minton (@cyberraiju) 's Twitter Profile Photo

๐Ÿ‘€ A threat actor has cloned the California Freights website, modified it, is gathering information, and trying to make it feel legitimate. At the end the user runs an exe currently clean on VT virustotal.com/gui/file/19b88โ€ฆ Leads to NetSupport RAT C2: ukuhost[.]net yogupay[.]net

Magic Sword (@magicswordio) 's Twitter Profile Photo

๐Ÿšจ The RMM threat landscape is evolving! ๐Ÿšจ Recent attacks, like those highlighted by Huntress ๐Ÿ›ก๏ธ & CERT-UA ๐Ÿ‡บ๐Ÿ‡ฆ, show how adversaries ๐ŸŽญ weaponize RMM tools ๐Ÿ› ๏ธ for persistence ๐Ÿ”’ & lateral movement โ†”๏ธ. ๐Ÿ” Enter LOLRMM: your ๐Ÿง™โ€โ™‚๏ธ ally in detecting ๐Ÿ‘€ & preventing ๐Ÿšซ RMM abuse.

๐Ÿšจ The RMM threat landscape is evolving! ๐Ÿšจ

Recent attacks, like those highlighted by <a href="/HuntressLabs/">Huntress</a> ๐Ÿ›ก๏ธ &amp; CERT-UA ๐Ÿ‡บ๐Ÿ‡ฆ, show how adversaries ๐ŸŽญ weaponize RMM tools ๐Ÿ› ๏ธ for persistence ๐Ÿ”’ &amp; lateral movement โ†”๏ธ.

๐Ÿ” Enter LOLRMM: your ๐Ÿง™โ€โ™‚๏ธ ally in detecting ๐Ÿ‘€ &amp; preventing ๐Ÿšซ RMM abuse.
Jai Minton (@cyberraiju) 's Twitter Profile Photo

Yeah ๐Ÿ˜“, this is done through a tracking template. They set the final URL to be a legitimate website, but then with the tracking template have it go through a different domain first that then redirects you wherever they like. support.google.com/google-ads/ansโ€ฆ It's shit for security

Jai Minton (@cyberraiju) 's Twitter Profile Photo

This is really big at the moment and you should absolutely be looking at your M365 logs to identify this activity. speartip.com/fasthttp-used-โ€ฆ We're observing a large number of IPs involved after successful authentication, but a common IP is 113.23.43[.]76 CC:Huntress

Jon Hencinski (@jhencinski) 's Twitter Profile Photo

Big news! I've joined Rapid7 as VP of Threat Detection and Response. Energized to lead our #MDR into its next phase of growth. My focus: revolutionizing the #SOC by reimagining the analyst experience and pushing the boundaries of threat detection to deliver industry-leading

Yamato Security Tools (@securityyamato) 's Twitter Profile Photo

Just updated our documentation on using Timesketch to analyze Hayabusa results: github.com/Yamato-Securitโ€ฆ It includes an overview of the main features you want to use in your investigations.

Wietze (@wietze) 's Twitter Profile Photo

ATT&CK ๐Ÿ“ข Shout-out to #HijackLibs's many contributors, including recent additions from @cyberraiju, @xorjosh, Faraday (all of Huntress), swachchhanda Poudel, ๅฎ‰ๅ‚ๆ˜Ÿๆตท Azaka || VTuber, ice-wzl - thanks for sharing your findings with the cyber security community ๐Ÿ”ฅ

Max Rogers (@maxrogers5) 's Twitter Profile Photo

As more companies deploy the Huntress SIEM, we've enjoyed finding the "Door Rattlers"๐Ÿšช We see an attacker failing to log in across a number of environments and then eventually succeeding in 1 organization. PhotoCred: Dray Agha Stopping attacks at initial access โค๏ธ

As more companies deploy the <a href="/HuntressLabs/">Huntress</a> SIEM, we've enjoyed finding the "Door Rattlers"๐Ÿšช

We see an attacker failing to log in across a number of environments and then eventually succeeding in 1 organization. PhotoCred: <a href="/Purp1eW0lf/">Dray Agha</a>

Stopping attacks at initial access โค๏ธ
alden (@birchb0y) 's Twitter Profile Photo

excited bc today Huntress is releasing our analysis of a gnarly intrusion into a web3 company by the DPRK's BlueNoroff!! ๐Ÿค  we've observed 8 new pieces of macOS malware from implants to infostealers! and they're actually good (for once)! huntress.com/blog/inside-blโ€ฆ

Max Rogers (@maxrogers5) 's Twitter Profile Photo

Mac's don't get viruses, right? ๐Ÿ Deepfake Zoom calls. AppleScript lures. Rosetta 2 abuse. Plenty of custom malware: Nim backdoor, Go infostealer, Obj-C keylogger, and more! Amazing write-up by alden, Stuart Ashenbrenner ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡จ๐Ÿ‡ฆ, and Jonathan Semon ๐Ÿ”ฅ ๐Ÿ”— huntress.com/blog/inside-blโ€ฆ

Objective-See Foundation (@objective_see) 's Twitter Profile Photo

Not only is Huntress a generous supporter of our Foundation, they also consistently publish top-notch research on emerging macOS threats ๐Ÿคฉ Their latest (by alden & Stuart Ashenbrenner ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡จ๐Ÿ‡ฆ): "Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion": huntress.com/blog/inside-blโ€ฆ

Anton (@antonlovesdnb) 's Twitter Profile Photo

Coming up on my 1 year anniversary with Huntress ! Taking this opportunity to go over some things myself and the team have seen in intrusions and drop some tips on basic things you can do to make your network more immune to compromise. Let's start with initial access -