Joe (@jinx_soda) 's Twitter Profile
Joe

@jinx_soda

#AdvancedPractices Threat Analysis 🦅 @Mandiant
Tweets are my own

ID: 764330902184951808

calendar_today13-08-2016 05:21:02

277 Tweet

560 Takipçi

487 Takip Edilen

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

🚨 China-nexus espionage actors increasingly utilize scalable "ORB networks" to evade detection. Learn how these networks function and how defenders should respond in our latest blog post: bit.ly/4bOUuJ4 #Cybersecurity #CyberEspionage #Mandiant

🚨 China-nexus espionage actors increasingly utilize scalable "ORB networks" to evade detection. 

Learn how these networks function and how defenders should respond in our latest blog post: bit.ly/4bOUuJ4

#Cybersecurity #CyberEspionage #Mandiant
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

UNC3944 Evolving Tactics Exposed! Our new blog dives deep into UNC3944's recent SaaS attacks, analyzing their changing methods and goals. Read now: bit.ly/3x5WC0l #Cybersecurity #ThreatIntelligence #UNC3944

UNC3944 Evolving Tactics Exposed!

Our new blog dives deep into UNC3944's recent SaaS attacks, analyzing their changing methods and goals.

Read now: bit.ly/3x5WC0l

#Cybersecurity #ThreatIntelligence #UNC3944
Jared Wilson (@jwilsonsecurity) 's Twitter Profile Photo

🔥New APT41 Methodologies 🔥 While DUSTTRAP was really interesting, analyzing the methodologies observed alongside SQLULDR2 and PINEGROVE were fascinating. Both families highlight very specific methodologies worth hunting for. Check the blog for details! cloud.google.com/blog/topics/th…

Josh++ (@josh_murchie) 's Twitter Profile Photo

Happy to get this out the door: cloud.google.com/blog/topics/th… Big thanks to queen basic ⊛ Joe @nicastronaut and the other named and unnamed authors. A few highlights ⬇️

queen basic ⊛ (@onfvp) 's Twitter Profile Photo

New Mandiant (part of Google Cloud) blog on UNC4393, the primary user of BASTA. ✨ TTP shifts post-QAKBOT takedown, particularly regarding initial access. ✨ Increased custom malware, though LOTL & commodity tools still prevalent. 🔥 Josh++ Joe @nicastronaut cloud.google.com/blog/topics/th…

queen basic ⊛ (@onfvp) 's Twitter Profile Photo

✨ A ton of IOCs and detections were included in the to help defenders. ✨ Nifty VT collection: virustotal.com/gui/collection…

Steve Stone (@stonepwn3000) 's Twitter Profile Photo

Great writeup on UNC4393--the author list got my initial read, the campaign list kept me to the end, but REALLY loved the transparency on where the observables came from (screenshot below).

Great writeup on UNC4393--the author list got my initial read, the campaign list kept me to the end, but REALLY loved the transparency on where the observables came from (screenshot below).
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

🚨 Check out our latest blog post on #UNC4393. Mandiant first identified this group in mid-2022, and we've tracked over 40 intrusions across 20 industries. Discover their evolving tactics, including a shift from available tools to custom malware → bit.ly/3A3DbpP

🚨 Check out our latest blog post on #UNC4393. 

Mandiant first identified this group in mid-2022, and we've tracked over 40 intrusions across 20 industries. 

Discover their evolving tactics, including a shift from available tools to custom malware → bit.ly/3A3DbpP
billy leonard (@billyleonard) 's Twitter Profile Photo

🆕🚨 analysis from Google on APT42 activity against 🇺🇸 and 🇮🇱. A ton of work from folks over the past few months dedicated to protecting users disrupting campaigns, and making life hard for the actors. More to come! blog.google/threat-analysi…

Gigs @ Shmoo (@gigs_security) 's Twitter Profile Photo

“Malware distribution groups are tricky to look at as a collective, so let’s narrow it down to some of my *least* favorites…” See ya next week, mWISE Conference 🫶🏼 #mWISE2024

Joe (@jinx_soda) 's Twitter Profile Photo

DPRK's UNC5267 operations have expanded greatly over the past few years. It is essential to be proactive and detect them in your environment. These operations directly fund North Korea by diverting the paychecks they obtain back to the regime. cloud.google.com/blog/topics/th…

Moritz (@m_r_tz) 's Twitter Profile Photo

Great technical post on LummaC2 obfuscation and how to deobfuscate samples through symbolic backward slicing: cloud.google.com/blog/topics/th… 🫸🫷 Chuong Dong and Nino!

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

🚨 Breaking: A zero-day vulnerability (CVE-2024-47575) has been observed impacting Fortinet FortiManager devices, posing serious risks. Learn how the exploit works, and how to defend against the threat. Read more -> bit.ly/4hbqmuR #ThreatIntelligence

🚨 Breaking: A zero-day vulnerability (CVE-2024-47575) has been observed impacting Fortinet FortiManager devices, posing serious risks. Learn how the exploit works, and how to defend against the threat.

Read more -> bit.ly/4hbqmuR

#ThreatIntelligence
John (@big_bad_w0lf_) 's Twitter Profile Photo

🔥new blog detailing 0day exploitation of Ivanti appliances as well as newly observed malware families tracked as PHASEJAM and DRYHOOK. We also detail activity related to the previously observed SPAWN malware ecosystem tied to China nexus cluster UNC5337. cloud.google.com/blog/topics/th…