Threat Hunting (@mahdi_htm) 's Twitter Profile
Threat Hunting

@mahdi_htm

Open to negotiate for threat hunting and threat analysis remote services

ID: 991630721210114048

calendar_today02-05-2018 10:49:22

219 Tweet

1,1K Followers

412 Following

Threat Hunting (@mahdi_htm) 's Twitter Profile Photo

You can reduce the initial access attack surface by disabling mounting of image containers like ISO files. The policy : •Computer Configuration => Administrative Template => System => Device Installation => Device Installation Restriction #threathunting

You can reduce the initial access attack surface by disabling mounting of image containers like ISO files.

The policy : 
•Computer Configuration => Administrative Template => System => Device  Installation => Device Installation Restriction
#threathunting
Threat Hunting (@mahdi_htm) 's Twitter Profile Photo

APT28 has been targeting Iranian Embassy in Albania with the Browser In The Browser (BITB) phishing technique. Kudos to CERT-UA for first discovering this.

APT28 has been targeting Iranian Embassy in Albania with the Browser In The Browser (BITB) phishing technique. Kudos to <a href="/_CERT_UA/">CERT-UA</a> for first discovering this.
Threat Hunting (@mahdi_htm) 's Twitter Profile Photo

Initial Access with Compiled HTML File (CHM) have been used by different TAs including APT37 and APT41. For hunting/detecting them you should check hh.exe spawning mshta.exe or any other related LOBINs in Event ID 1 of Sysmon or 4688 See the execution flow in the following pics

Initial Access with Compiled HTML File (CHM) have been used by different TAs including APT37 and APT41.

For hunting/detecting them you should check hh.exe spawning mshta.exe or any other related LOBINs in Event ID 1 of Sysmon or 4688

See the execution flow in the following pics
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

You can either hunt for it or check and apply our Sigma rules If you're unsure whether a detection idea is already covered by an existing rule, you can use the sigmasearchengine.com, which was developed by my team member @ph_t__ We've also integrated the API of that service

You can either hunt for it or check and apply our Sigma rules

If you're unsure whether a detection idea is already covered by an existing rule, you can use the sigmasearchengine.com, which was developed by my team member @ph_t__

We've also integrated the API of that service
Threat Hunting (@mahdi_htm) 's Twitter Profile Photo

1) Great talk in Positive hack days about OPSEC mistakes, challenges and techniques for my dear partnerships from positive technologies. I have talked about various Threat Intelligence tips and tricks and OPSEC mistakes like NOBUS WebShell, Operations Security (OPSEC),

1) Great talk in Positive hack days about OPSEC mistakes, challenges and techniques for my dear partnerships from positive technologies. I have talked about various Threat Intelligence tips and tricks and OPSEC mistakes like NOBUS WebShell, Operations Security (OPSEC),
Threat Hunting (@mahdi_htm) 's Twitter Profile Photo

Enterprise Threat Hunting to catch and follow Lazarus recent campaign with passive DNS. Validin provides extensive passive DNS records, which map domains to their associated IP addresses over time. This allows analysts to see where a domain has been hosted and track any changes.

Enterprise Threat Hunting to catch and follow Lazarus recent campaign with passive DNS. 
Validin provides extensive passive DNS records, which map domains to their associated IP addresses over time. This allows analysts to see where a domain has been hosted and track any changes.
Threat Hunting (@mahdi_htm) 's Twitter Profile Photo

F5 The Perfect Place to Hide China Threat Group Abuses F5 Load for Persistence. The investigation confirmed that the threat actor maintained a presence in the organizations on-premise network for about three years. The overall goal to the target network for espionage. SygniaTeam

F5 The Perfect Place to Hide
China Threat Group Abuses F5 Load for Persistence. The investigation confirmed that the threat actor maintained a presence in the organizations on-premise network for about three years. The overall goal  to the target network for espionage.
SygniaTeam
Threat Hunting (@mahdi_htm) 's Twitter Profile Photo

CHM files are being used for Initial Access (Phish-to-Persist), particularly by DPRK-attributed threat actors and more recently in cybercrime operations. #threatintelligence #threathunting

CHM files are being used for Initial Access (Phish-to-Persist), particularly by DPRK-attributed threat actors and more recently in cybercrime operations.

#threatintelligence #threathunting
Threat Hunting (@mahdi_htm) 's Twitter Profile Photo

APT29 and APT28 separately targeted diplomatic entities within a year using decoy and phishing tactics, including a car sale lure. Each group employed distinct methods, such as hosting payloads on public services like webhook. #threatintelligence Thanks Unit42

APT29 and APT28 separately targeted diplomatic entities within a year using decoy and phishing tactics, including a car sale lure. Each group employed distinct methods, such as hosting payloads on public services like webhook.
#threatintelligence
Thanks Unit42
Threat Hunting (@mahdi_htm) 's Twitter Profile Photo

Does anyone know which threat actor is attributed to stealing IIS machine keys for persistence (executing commands on a web server remotely through IIS insecure serialization)? #threatintel

Threat Hunting (@mahdi_htm) 's Twitter Profile Photo

🚨 After seeing the Snake driver sniff inbound traffic from a mail server using an incredible technique, now we encounter something new: a Linux kernel module that hijacks inbound network traffic to compromised systems. Innovation in attack vectors is relentless.

🚨 After seeing the Snake driver sniff inbound traffic from a mail server using an incredible technique, now we encounter something new: a Linux kernel module that hijacks inbound network traffic to compromised systems.

Innovation in attack vectors is relentless.