#Microsoft #Threat #Intelligence #Iranian #APTs
مایکروسافت گزارشی از تحرکات یکی دو سال اخیر سایبری ایران منتشر کرده و در اونجا تیم های فعال منتسب به دستگاه های امنیتی ایران رو مشخص کرده است.
نکته قابل توجه در این گزارش، رفتار های تاکتیکی تکنیکی این تیم ها بوده که عموما بر پایه یک سطح مشخصی تعریف شده، به عنوان مثال استفاده گستره از Exploit Public-Facing یا کد های بهره برداری عمومی شده که برای ایجاد دسترسی استفاده شده است.
آسیب پذیری هایی مانند Log4Shell ، CVE-2022-47966 و CVE-2022-47986 و چند مورد دیگر که در خصوص نرم افزار های خاص عموم شده بود. اما اهداف چه بوده است؟ عموم اهداف Data theft یا سرقت اطلاعات بوده، در مرحله بعد Defacement یا تخریب ظاهر وب سرویس های قربانی بوده است.
این تیم ها عموما در مراحل تخصصی تیم قرمز، طراحی و توسعه انجام میدهند و مراحلی مانند ایجاد دسترسی را بواسطه یک فرصت عمومی ایجاد شده اعمال میکنند، از این روی بعد از منتشر شدن یک آسیب پذیری سطح حساس، میتوانیم منتظر حملات گستره این تیم ها باشیم.
@Engineer_Computer
مایکروسافت گزارشی از تحرکات یکی دو سال اخیر سایبری ایران منتشر کرده و در اونجا تیم های فعال منتسب به دستگاه های امنیتی ایران رو مشخص کرده است.
نکته قابل توجه در این گزارش، رفتار های تاکتیکی تکنیکی این تیم ها بوده که عموما بر پایه یک سطح مشخصی تعریف شده، به عنوان مثال استفاده گستره از Exploit Public-Facing یا کد های بهره برداری عمومی شده که برای ایجاد دسترسی استفاده شده است.
آسیب پذیری هایی مانند Log4Shell ، CVE-2022-47966 و CVE-2022-47986 و چند مورد دیگر که در خصوص نرم افزار های خاص عموم شده بود. اما اهداف چه بوده است؟ عموم اهداف Data theft یا سرقت اطلاعات بوده، در مرحله بعد Defacement یا تخریب ظاهر وب سرویس های قربانی بوده است.
این تیم ها عموما در مراحل تخصصی تیم قرمز، طراحی و توسعه انجام میدهند و مراحلی مانند ایجاد دسترسی را بواسطه یک فرصت عمومی ایجاد شده اعمال میکنند، از این روی بعد از منتشر شدن یک آسیب پذیری سطح حساس، میتوانیم منتظر حملات گستره این تیم ها باشیم.
@Engineer_Computer
#DiyakoSecureBow
Analytics
2023 Data Breach Investigations Report:
Hello, and welcome first-time readers! Before you get started on the 2023 Data Breach Investigations Report (DBIR), it might be a good idea to take a look at this section first. (For those of you who are familiar with the report, please feel free to jump over to the introduction.) We have been doing this report for a while now, and we appreciate that the verbiage we use can be a bit obtuse at times. We use very deliberate naming conventions, terms and definitions and spend a lot of time making sure we are consistent throughout the report. Hopefully this section will help make all of those more familia
Breaking the string of end-of-year InfoSec milestones set in 2020 with SolarWinds Orion and in 2021
by Log4j, December 2022 was comparatively boring. Intelligence indicated several threat actors were abusing Microsoft developer accounts to get malicious drivers signed through their profiles to be used
in cyberattacks, including ransomware incidents and SIM swapping operations. The streak of months with attacks exploiting zero-day vulnerabilities was extended with reports of successful attacks on Microsoft, Apple, Fortinet and Citrix products. OWASSRF is a new attack chain exploiting on-premises Exchange Servers using the URL rewrite mitigations provided by Microsoft responding to September’s ProxyNotShell attack chain. The Play ransomware threat actors had exploited OWASSRF to attack at least eight victims. Among the best intelligence collections was a virtual order of battle of TA subordinate to Bureau 121 in the Reconnaissance General Bureau (RGB), North Korea’s military intelligence agency.
Special thanks to Dave Kennedy of the Verizon Threat Research Advisory Center (VTRAC) for his continued support and yearly contribution to this report.
#developerslife #data #research #infosec #help #intelligence #military #analytics #microsoft
@Engineer_Computer
Analytics
2023 Data Breach Investigations Report:
Hello, and welcome first-time readers! Before you get started on the 2023 Data Breach Investigations Report (DBIR), it might be a good idea to take a look at this section first. (For those of you who are familiar with the report, please feel free to jump over to the introduction.) We have been doing this report for a while now, and we appreciate that the verbiage we use can be a bit obtuse at times. We use very deliberate naming conventions, terms and definitions and spend a lot of time making sure we are consistent throughout the report. Hopefully this section will help make all of those more familia
Breaking the string of end-of-year InfoSec milestones set in 2020 with SolarWinds Orion and in 2021
by Log4j, December 2022 was comparatively boring. Intelligence indicated several threat actors were abusing Microsoft developer accounts to get malicious drivers signed through their profiles to be used
in cyberattacks, including ransomware incidents and SIM swapping operations. The streak of months with attacks exploiting zero-day vulnerabilities was extended with reports of successful attacks on Microsoft, Apple, Fortinet and Citrix products. OWASSRF is a new attack chain exploiting on-premises Exchange Servers using the URL rewrite mitigations provided by Microsoft responding to September’s ProxyNotShell attack chain. The Play ransomware threat actors had exploited OWASSRF to attack at least eight victims. Among the best intelligence collections was a virtual order of battle of TA subordinate to Bureau 121 in the Reconnaissance General Bureau (RGB), North Korea’s military intelligence agency.
Special thanks to Dave Kennedy of the Verizon Threat Research Advisory Center (VTRAC) for his continued support and yearly contribution to this report.
#developerslife #data #research #infosec #help #intelligence #military #analytics #microsoft
@Engineer_Computer
ELINT.pdf
563.7 KB
📡The E-Intelligence System
"Electronic Intelligence (ELINT), often known as E-Intelligence, is intelligence obtained through electronic sensors. Other than personal communications, ELINT intelligence is usually obtained. The goal is usually to determine a target's capabilities, such as radar placement. Active or passive sensors can be employed to collect data. A provided signal is analyzed and contrasted to collected data for recognized signal types.
The information may be stored if the signal type is detected; it can be classed as new if no match is found. ELINT collects and categorizes data. In a military setting (and others that have adopted the usage, such as a business), intelligence helps an organization make decisions that can provide them a strategic advantage over the competition. The term "intel" is frequently shortened. The two main subfields of signals intelligence (SIGINT) are ELINT and Communications Intel (COMINT)."
#Intelligence #SIGINT #ELINT #radar #signal #Electronic_Warfare #UAV #ESM
"Electronic Intelligence (ELINT), often known as E-Intelligence, is intelligence obtained through electronic sensors. Other than personal communications, ELINT intelligence is usually obtained. The goal is usually to determine a target's capabilities, such as radar placement. Active or passive sensors can be employed to collect data. A provided signal is analyzed and contrasted to collected data for recognized signal types.
The information may be stored if the signal type is detected; it can be classed as new if no match is found. ELINT collects and categorizes data. In a military setting (and others that have adopted the usage, such as a business), intelligence helps an organization make decisions that can provide them a strategic advantage over the competition. The term "intel" is frequently shortened. The two main subfields of signals intelligence (SIGINT) are ELINT and Communications Intel (COMINT)."
#Intelligence #SIGINT #ELINT #radar #signal #Electronic_Warfare #UAV #ESM
powershellautomationandscriptingforcybersecurity
#threat #intelligence
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
#threat #intelligence
Please open Telegram to view this post
VIEW IN TELEGRAM
vulnerabilityresearchershandbook
#threat #intelligence
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
#threat #intelligence
Please open Telegram to view this post
VIEW IN TELEGRAM
Investigating emails is essential in OSINT.
#31DaysOfOSINT
There are hundreds of tools available for email investigations.
But not all of them work the same way or serve the same purpose.
Here are some of the best tools you can use today:
GHunt – https://github.com/mxrch/GHunt
EPIEOS – https://epieos.com/
OSINT Industries – https://osint.industries
Castrick – https://castrickclues.com/
Holehe – https://github.com/megadose/holehe
Mailcat – https://mailcat.com/
Emailrep.io – https://emailrep.io/
HaveIBeenPwned – https://haveibeenpwned.com/
DeHashed – https://dehashed.com/
BreachDirectory – https://breachdirectory.org/
Whoxy – https://www.whoxy.com/
Reverse Whois – https://reversewhois.io/
Scamsearch.io – https://scamsearch.io/
That’s Them – https://thatsthem.com/
InsE (Inspect Email) – https://inse.io/
osint.rocks – https://osint.rocks/
Skymem – https://skymem.com/
SignalHire – https://www.signalhire.com/
Hunter.io – https://hunter.io/
SimpleLogin – https://simplelogin.io/
Proton Mail – https://proton.me/mail
When you have an email to investigate, try all these options.
You’re almost guaranteed to get results.
Save and share with your network! ♻️
📲 OSINT Excellence has launched its Dark Web Intelligence Course. Now available in English!
🕵️♂️🌐 A unique program designed exclusively for those aiming to become true Dark Web experts.
→ One-of-a-kind content
→ Hands-on methods and real-world techniques
→ For professionals ready to level up
#advancedOSINT #cyber #intelligence #enterprises
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
#31DaysOfOSINT
There are hundreds of tools available for email investigations.
But not all of them work the same way or serve the same purpose.
Here are some of the best tools you can use today:
GHunt – https://github.com/mxrch/GHunt
EPIEOS – https://epieos.com/
OSINT Industries – https://osint.industries
Castrick – https://castrickclues.com/
Holehe – https://github.com/megadose/holehe
Mailcat – https://mailcat.com/
Emailrep.io – https://emailrep.io/
HaveIBeenPwned – https://haveibeenpwned.com/
DeHashed – https://dehashed.com/
BreachDirectory – https://breachdirectory.org/
Whoxy – https://www.whoxy.com/
Reverse Whois – https://reversewhois.io/
Scamsearch.io – https://scamsearch.io/
That’s Them – https://thatsthem.com/
InsE (Inspect Email) – https://inse.io/
osint.rocks – https://osint.rocks/
Skymem – https://skymem.com/
SignalHire – https://www.signalhire.com/
Hunter.io – https://hunter.io/
SimpleLogin – https://simplelogin.io/
Proton Mail – https://proton.me/mail
When you have an email to investigate, try all these options.
You’re almost guaranteed to get results.
Save and share with your network! ♻️
📲 OSINT Excellence has launched its Dark Web Intelligence Course. Now available in English!
🕵️♂️🌐 A unique program designed exclusively for those aiming to become true Dark Web experts.
→ One-of-a-kind content
→ Hands-on methods and real-world techniques
→ For professionals ready to level up
#advancedOSINT #cyber #intelligence #enterprises
Please open Telegram to view this post
VIEW IN TELEGRAM
❤🔥4👏2❤1👍1🔥1