Ned Moran (@moranned) 's Twitter Profile
Ned Moran

@moranned

Professor. Consultant. Analyst. Technologist. Security Geek. Privacy Advocate. Runner. Couch Potato.

ID: 6446272

calendar_today30-05-2007 15:54:44

1,1K Tweet

1,1K Followers

403 Following

Jessica Payne (@jepaynemsft) 's Twitter Profile Photo

Which Ransomware payload is deployed at the end of a killchain is pretty much a stylistic choice by the attackers. Human Operated Ransomware campaigns overlap in their entry vectors, C2 tools, and lateral movement techniques- and also in viable defenses. aka.ms/human-operated…

Оlga Belogolova 🌻 (@olgs7) 's Twitter Profile Photo

Thanks for your patience, class! Took a little hiatus for a month. But we're back! In week 5 of “Lies & Disinformation” Georgetown University, we pivoted from Russian influence activities to Chinese and Iranian IO state actors.

bk (Ben Koehl) (@bkmsft) 's Twitter Profile Photo

It's almost as if there are companies providing/selling capabilities whether its Implants, Exploits, or all of the above and what you may see here are downstream customers. Ned Moran and I covered this a little bit in shadowserver.org/news/the-itali… from 2015.

bk (Ben Koehl) (@bkmsft) 's Twitter Profile Photo

There are a number of these kinds of examples where this kind of sharing can be inferred too in the infrastructure side of things, but.. this is Twitter and they probably also read the same tweets the defenders do.

Saher Naumaan (@saffronsec) 's Twitter Profile Photo

While MuddyWater's link to ransomware remains tenuous and unproven, the group is heavily invested in custom tool development. From PowerShell to .NET to C++ malware, Muddy is fast approaching other groups' capabilities. Sean Lyngaas reports w/ lines from me cyberscoop.com/muddywater-ira…