November 21, 2022
-
-
-
https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse https://mastodon.social/@campuscodi/109376602832029191The Google Cloud security team has released a set of open-source YARA Rules and a VirusTotal Collection to help security practitioners flag and identify Cobalt Strike components and specific Cobalt Strike versions on their networks.
-
Bear in mind that the source of the “leak” is “Winds of Change” a completely unverified source. They claim to be inside the FSB. But, here’s the thing, the FSB generally takes a poor view on people leaking secrets. As a rule they don’t let people just hang out at the office and tell the world what’s going on internally. Treason ain’t just a river in Egypt. 🤔
-
-
-
Time for a thread! 1/n-
"AD is a system where any time you hack any computer on the network, you can become the domain controller, and own the whole company. That's just how it works.”
— @dave_aitel@mastodon.social
https://infosec.exchange/@raptor/109378388882420409-
Screen captured the last ~3.5 minutes of imagery before loss of signal and turned it into a (sped up) GIF animation.👇 Credit: NASA TV/ESA-
-