Tommy M (TheAnalyst) Profile Banner
Tommy M (TheAnalyst) Profile
Tommy M (TheAnalyst)

@ffforward

Followers
14,263
Following
192
Media
1,027
Statuses
4,458
Explore trending content on Musk Viewer
Pinned Tweet
@ffforward
Tommy M (TheAnalyst)
3 years
So I have started a new job this week, as a Threat Researcher for @proofpoint . Can you imagine working with such an awesome team that finds and shares stuff like this? 🙌👏🥳
@threatinsight
Threat Insight
3 years
Proofpoint has identified a compromised private military email account delivering #SunSeed Lua malware. Threat research related to this activity is detailed in this blog.
3
70
105
33
13
250
@ffforward
Tommy M (TheAnalyst)
4 years
#SUNBURST #ProTip You think you are safe because your security vendor says it detects the bad DLLs? First make sure you haven't followed @solarwinds advisory to exclude the folder where the DLLs reside 🤣😂🤯
Tweet media one
12
185
489
@ffforward
Tommy M (TheAnalyst)
3 years
Latest #KaseyaVSA #REvil update from @HuntressLabs "[...] the threat actor used an authentication bypass in the web interface of Kaseya VSA to gain an authenticated session, upload the original payload, and then execute commands via SQL injection."
Tweet media one
11
210
481
@ffforward
Tommy M (TheAnalyst)
3 years
I'm telling you, this #Dridex affiliate is just running one huge social experiment...
Tweet media one
Tweet media two
10
77
302
@ffforward
Tommy M (TheAnalyst)
2 years
Emotet started spamming XLS and zipped XLS at 08:00 UTC sharp. All XLS are so far ef2ce641a4e9f270eea626e8e4800b0b97b4a436c40e7af30aeb6f02566b809c
Tweet media one
5
88
211
@ffforward
Tommy M (TheAnalyst)
3 years
TFW you just want to download a cracked TeamViewer from google top result, and instead get #RedLine #Vidar #Raccoon #SmokeLoader #socelars #gcleaner #SilentXMRMiner and a bunch of other unidentified stuff... EXE: HTTP/S IOCs:
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
41
197
@ffforward
Tommy M (TheAnalyst)
4 years
Umm it seems like #BazaLoader just had a major opsec fail, their new Google Docs link for "Re: your document" shows this: cc @malwrhunterteam @James_inthe_box @GossiTheDog @VK_Intel @JAMESWT_MHT
Tweet media one
11
75
199
@ffforward
Tommy M (TheAnalyst)
3 years
You all have read how #BazarLoader #BazaLoader leads to #ransomware , in particular #conti that doesn't care that they target healthcare etc? Does @Microsoft have any responsibility in this when they KNOWINGLY are hosting hundreds of files leading to this, now for over three days?
Tweet media one
Tweet media two
@ffforward
Tommy M (TheAnalyst)
3 years
Large #BazarISO > #BazarLoader > #BazarBackdoor inc from /muppetcast.com, started yesterday. Direct links to @onedrive . Iso contains dll+lnk running dll with entrypoint "EnterDll", your EDR might have problems detecting this, and less obvious for most users than maldocs... >
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
50
154
7
57
180
@ffforward
Tommy M (TheAnalyst)
3 years
Wow, pretty cool #phishing campaign🔥 Lure is an update to Teams calendar. Attached PDF is personalized and links to @Google feedproxy *.msoteams.live > *.msoffice.team. Click > localized phish in new window on *.msoutlook.team
Tweet media one
Tweet media two
Tweet media three
Tweet media four
3
54
157
@ffforward
Tommy M (TheAnalyst)
3 years
Large #BazarISO > #BazarLoader > #BazarBackdoor inc from /muppetcast.com, started yesterday. Direct links to @onedrive . Iso contains dll+lnk running dll with entrypoint "EnterDll", your EDR might have problems detecting this, and less obvious for most users than maldocs... >
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
50
154
@ffforward
Tommy M (TheAnalyst)
3 years
I have observed a recent uptick in html attachments abusing "Right-to-Left override" Unicode in the file name, for example the recent Oauth #phishing consent campaign. This is a good detection opportunity that MDO seems to miss, so please check your environment. Regex "\u202E"
Tweet media one
Tweet media two
6
52
140
@ffforward
Tommy M (TheAnalyst)
3 years
Awesome to hear that my intelligence is appreciated, and in my turn I would like to thank the whole @Cryptolaemus1 team for being so fantastic that it gives me time to look at other odd stuff! @JRoosen @0xtadavie @abuse_ch @devnullnoop @dms1899 @executemalware @James_inthe_box >
@SwiftOnSecurity
SwiftOnSecurity
3 years
Been extremely impressed with the phishing intelligence @ffforward is generating. World-class by the hours stuff.
3
5
91
7
15
134
@ffforward
Tommy M (TheAnalyst)
3 years
Guess who hasn't acted on abuse reports at all today? @Microsoft @onedrive . Guess who is using @onedrive today? #Hancitor . Guess what happens if you run a #Hancitor maldoc? You Get #Cuba #Ransomare Yay!
Tweet media one
Tweet media two
@ffforward
Tommy M (TheAnalyst)
3 years
Yep, today TR has discovered that @onedrive is a perfect bulletproof host, and have 300+ files there, just as #BazarLoader . The fun thing is that TR stuff ( #QakBot etc) is known to also lead to #Conti . So @microsoft has roughly doubled your chances to get #ransomware in a week!
4
35
99
1
39
123
@ffforward
Tommy M (TheAnalyst)
4 years
So who agrees that I should sue @MsftSecIntel @MSThreatProtect for attempted murder by heart attack? Woke up to this today:
Tweet media one
Tweet media two
Tweet media three
Tweet media four
15
22
120
@ffforward
Tommy M (TheAnalyst)
9 months
Can confirm that we have seen the recent #Qbot #Quakbot #Qakbot activity. PDFs/URLs has been used since at least November 28, but can't confirm what payload it was earlier than December 11. URL example: MSI/DLL:
2
49
122
@ffforward
Tommy M (TheAnalyst)
3 years
Tweet media one
Tweet media two
5
24
121
@ffforward
Tommy M (TheAnalyst)
3 years
TFW the #BazaLoader #BazarLoader crew accidentally adds the access logs for one of their distros as comments (yes, that is actually a thing) in a zip they spam... 🤷‍♂️
Tweet media one
6
48
107
@ffforward
Tommy M (TheAnalyst)
2 years
Oh no, to be able to view this shipping document in OneNote I must update my flash player ☹️
Tweet media one
3
12
109
@ffforward
Tommy M (TheAnalyst)
2 years
Right about when I started at PFPT my awesome coworkers released an awesome blog about #TA416 . Now two months later TALOS releases a blog almost 1:1 with our blog without citing previous research, and @TheHackersNews picks it up as "Experts Uncover New Espionage Attacks". 🤷‍♂️
Tweet media one
Tweet media two
Tweet media three
7
30
106
@ffforward
Tommy M (TheAnalyst)
3 years
I can confirm that we see live malspam with inc with xlsm directly dropping #Emotet without #TrickBot intermediary. Stolen email threads as usual, this thing is propagating fast.
Tweet media one
@Cryptolaemus1
Cryptolaemus
3 years
Update on #Emotet . We are noticing now that bots are starting to spam on what we are calling the Epoch 4 botnet. There is only attachment based malspam seen so far with .docm or .xlsm(really XLSM with a lame AF Template "Excell") or password protected ZIPs(operation ZipLock). 1/x
11
173
302
2
52
99
@ffforward
Tommy M (TheAnalyst)
3 years
How about the North Korean #APT #Lazarus using @Microsoft @onedrive to distribute malicious zip with lnk? MSHTA > wscript > new LNK in startup > Reboot > MSHTA > wscript. C2 /share.stablemarket.org URL: ZIP:
Tweet media one
Tweet media two
3
52
98
@ffforward
Tommy M (TheAnalyst)
3 years
Interesting #TrickBot gtag rob139. Obfuscated HTML attachment with encrypted zip with obfuscated js in blob (HTML smuggling). HTML redirects to /abc.com if it doesn't like the browser. JS > PS > EXE. EXE requires vcredist to run.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
37
98
@ffforward
Tommy M (TheAnalyst)
3 years
Yep, today TR has discovered that @onedrive is a perfect bulletproof host, and have 300+ files there, just as #BazarLoader . The fun thing is that TR stuff ( #QakBot etc) is known to also lead to #Conti . So @microsoft has roughly doubled your chances to get #ransomware in a week!
4
35
99
@ffforward
Tommy M (TheAnalyst)
11 months
FWIW this has nothing to do with any qbot actors. Attribution would be easy if several different unrelated actors didn't use the same tooling. Mine and @selenalarson 's writeup on this Knight Lite Ransomware campaign (that came in via HTML attachments):
@TalosSecurity
Cisco Talos Intelligence Group
11 months
Despite a recent takedown from the FBI, our research indicates that the actor behind #Qakbot is still active with its spamming operations, and is still delivering the #RansomKnight #malware
Tweet media one
0
45
87
0
21
87
@ffforward
Tommy M (TheAnalyst)
9 months
We saw new #Qbot #Qakbot "tchk07" from PDF > URLs today. MSI > AdobeAC.dll w/ export EditOwnerInfo. This is still very low volume and targeted. Huge shout out to our fantastic @Myrtus0x0 for the RE and config extraction. IOCs in original thread. Samples:
@threatinsight
Threat Insight
9 months
Proofpoint has observed new #Qbot MSIs being distributed signed "Clover Field ApS". MSI: e88610db05636a1476435ec1f39d3651b080c8a6b8756452d421d7a822a2e115 DLL: 12094a47a9659b1c2f7c5b36e21d2b0145c9e7b2e79845a437508efa96e5f305
2
19
50
2
35
91
@ffforward
Tommy M (TheAnalyst)
3 years
‼️Massive active image-based #phishing campaign missed by Defender for @Office365 for several days. ‼️ /ad.atdmt.com @Meta > *.citech.co.za > *.oraclecloud.com @Oracle Exfils via JavaScript /urlflex.com > /smtpjs.com @webtropy > @gmail .com @Google
Tweet media one
Tweet media two
Tweet media three
7
48
88
@ffforward
Tommy M (TheAnalyst)
3 years
Can we please ignore log4shell for a moment and go back to patching exchange for #ProxyShell , to avoid what's happened to this 🇮🇹 Italian gov agency that just had their om-prem exchange popped to send TR #Qakbot malspam in reply chains? DM me a gov,it address for details.
Tweet media one
5
36
89
@ffforward
Tommy M (TheAnalyst)
4 years
So @solarwinds have finally decided that it's a good idea to list the hashes for the malicious DLLs (hidden in their FAQ). The problem is that they only list 7, while @MsftSecIntel now is up to 17. If compromised, you should only investigate if you have the expertise🤡 #SunBurst
Tweet media one
Tweet media two
Tweet media three
7
35
87
@ffforward
Tommy M (TheAnalyst)
3 years
#Phishing #BEC #Whaling via malicous Oath app "Upgrade" signed "Cardthartic LLC". Looks like it has been going on for a month. Related domain /viox.dev Make sure you don't allow users to consent apps in @azure @Office365 !
Tweet media one
Tweet media two
Tweet media three
6
43
84
@ffforward
Tommy M (TheAnalyst)
3 years
So again @Microsoft @onedrive hasn't acted on abuse reports since Thursday. Now #Hancitor is using it for doc delivery and #BazaLoader #BazarLoader is using it for zip > iso > lnk/DLL. 374 files not acted on, every single one will lead to #ransomware several times over!
Tweet media one
4
39
85
@ffforward
Tommy M (TheAnalyst)
3 years
I can confirm the #TA505 #MirrorBlast KiXtart > REBOL > #ReflectiveGnome > #FlawedGrace / #GraceWire chain. Latter drops from > BIN C2 /cdn-wfs-nspod.com on 46.161.40.87 since June 🔥 H/T @ET_Labs for awesome sigs!
Tweet media one
Tweet media two
Tweet media three
4
31
85
@ffforward
Tommy M (TheAnalyst)
2 years
It's not always easy being a Threat Actor. Like last night when #TA577 (or someone using their DLL by mistake) spammed an HTML > ISO campaign that used a non-existing export (CuMode) so it didn't detonate. Manually running the DLL with DrawThemeIcon does start the #qbot 🤣🤡
Tweet media one
4
20
81
@ffforward
Tommy M (TheAnalyst)
3 years
Don't you just love it when you multi-vendor cloud #phishing operation just works? 🇺🇸Sent from compromised @Office365 accounts 🇺🇸Redirects via @Google 🇺🇸Domains by @Namecheap 🇺🇸Hosting by @awscloud 52.214.58.200 & @digitalocean 142.93.233.42 64.225.82.48 143.244.209.177
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
27
81
@ffforward
Tommy M (TheAnalyst)
10 months
#TA544 back using #Remcos after using #SystemBC briefly last week. Unique page,link URLs redir to .url file with file://.zip/.vhd SMB target abusing CVE-2023-36025 so it will mount the VHD by just opening the .URL. Exe using #DOILoader #IDATLoader w. local payload. cc @wdormann
Tweet media one
3
25
82
@ffforward
Tommy M (TheAnalyst)
2 years
Speaking of which, today we see #IcedID via the same #OneNote template that #qbot actors #TA570 & #TA577 has been using the last few days. New obfuscation in the HTA though.
Tweet media one
Tweet media two
@virusbtn
Virus Bulletin
2 years
Proofpoint's Tommy Madjar, @cocaman , @joewise34 , @selenalarson & Chris Talib warn about the increasing use of Microsoft OneNote documents to deliver malware via email as multiple threat actors (such as TA577 & TA570) start to use this delivery method.
Tweet media one
2
16
26
4
32
79
@ffforward
Tommy M (TheAnalyst)
3 years
#Conti has just claimed @VolvoGroup -owned @MackDefense , who deliver military trucks worldwide, as a #ransomware victim 💥
Tweet media one
3
32
76
@ffforward
Tommy M (TheAnalyst)
3 years
This actor has just switched to a new OAuth consent #Phishing app. This one is also called "Upgrade" with the same icon, but has a new verified publisher "Counseling Services Yuma PC". Related domain /queues.me
Tweet media one
Tweet media two
@MsftSecIntel
Microsoft Threat Intelligence
3 years
Microsoft is tracking a recent consent phishing campaign, reported by @ffforward , that abuses OAuth request links to trick users into granting consent to an app named ‘Upgrade’. The app governance feature in Microsoft Defender for Cloud Apps flagged the app’s unusual behavior.
Tweet media one
9
188
295
2
34
75
@ffforward
Tommy M (TheAnalyst)
3 years
Heads up, very low detected new #BazaLoader doc inc as zip attachment. Word > splwow64.exe > CMD > PS > Rundll32 doc: dll: Payload URL: Nice @hatching_io run:
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
42
75
@ffforward
Tommy M (TheAnalyst)
3 years
Patches for next week has already leaked! #PrintingNightmare
Tweet media one
0
24
75
@ffforward
Tommy M (TheAnalyst)
3 years
Today I got both #SquirrelWaffle and #Qakbot from the same TR distro (payload URL). Downloads at as usual. #qbot config: #SquirrelWaffle config: 👏 @hatching_io
Tweet media one
Tweet media two
Tweet media three
2
27
74
@ffforward
Tommy M (TheAnalyst)
2 years
#qbot #qakbot #quakbot is back after the traditional summer break. Right now it seems to be dropped by #Smokeloader (according to "DAS-Security Orcas" sandbox, I have no clue who they are) probably from fake installers. Botnet snow01.
Tweet media one
2
33
72
@ffforward
Tommy M (TheAnalyst)
3 years
Heads up, #TrickBot rob129 inc via Link > zip > .lnk > curl > exe as png. H/T @Scoobs_McGee Zip⏬ Zip Png⏬ Exe Config cc @VK_Intel
Tweet media one
2
22
73
@ffforward
Tommy M (TheAnalyst)
3 years
(Thread) Very well executed unidentified campaign from friday. 📩 #covid19 #vaccine malspam from /cov19inf.com on @bacloud , with SPF and DKIM. Attached encrypted xlsm with unique(?) password with macro on close that drops 6KB dll loader that downloads 7MB EXE. C2 /usergtarca.com
Tweet media one
Tweet media two
3
29
72
@ffforward
Tommy M (TheAnalyst)
4 years
Now this is pretty cool. The #BazarCall campaign switched back to a XLS fully undetected on VT for almost four weeks(!!!) and just switched the file on the drop URL. XLS: EXE: cc @James_inthe_box @JAMESWT_MHT @VK_Intel
Tweet media one
4
22
72
@ffforward
Tommy M (TheAnalyst)
2 years
Heads up, TR/ #TA577 switched to IMG instead of ISO and VBS instead of LNK for their #qbot BB06 URL campaign today. Password NG11 for the dropped zips.
Tweet media one
Tweet media two
Tweet media three
0
24
73
@ffforward
Tommy M (TheAnalyst)
3 years
I'm working on my @KaseyaCorp decoder ring. So far we know that: Sophisticated attack = Simple attack and Very minimal impact = Huge impact But now we also know that: Good progress = No progress And this is just for their SaaS that they say wasn't impacted. So wasn't = was? 🙃
Tweet media one
Tweet media two
Tweet media three
3
20
70
@ffforward
Tommy M (TheAnalyst)
3 years
Heads up, #MirrorBlast coming in hot with @Google feedproxy links > /dzikic-my-sharepoint.com C2 185.202.93.201 URL: XLS:
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
27
68
@ffforward
Tommy M (TheAnalyst)
3 years
Swedish fintech @Klarna bank (valued at $31 billion, currently planning for an IPO on London Stock Exchange) had a major break down today, where users would end up in other peoples accounts when signing in to the app. Full purchase history, payments plans, everything.
3
38
68
@ffforward
Tommy M (TheAnalyst)
3 years
Possible #FIN7 #Griffon zip > js on @onedrive ✅Hosting service as sender ✅Heavily obfuscated ✅Highly evasive ✅Reconnaissance C2 /mummyvich.xyz/dxb/mx_cmd.php /mummyvich.xyz/dxb/mx_jscript.php 🤔 URL: js:
Tweet media one
Tweet media two
2
17
69
@ffforward
Tommy M (TheAnalyst)
3 years
This is pretty sick, was looking at a malspam linking to dropbox > HTML > Geofenced BRA > ZIP > MSI. But the MSI didn't run, looked into it, and instead of a classic 🇧🇷 banker, it contains 3862 credential pairs for @Terra and @iG . Please DM me if you work in security there.
Tweet media one
8
25
69
@ffforward
Tommy M (TheAnalyst)
3 years
This have been talked about thousand of times before. But I still think that if Microsoft finds that Microsoft hosts malicious files, Microsoft should notify Microsoft so Microsoft can remove the files. But no, still alive and well a week later.
Tweet media one
Tweet media two
4
17
66
@ffforward
Tommy M (TheAnalyst)
3 years
1/? Very interesting campaign targeting 🇮🇹. Russian girl looking for an Italian man to marry. Includes a txt in an encrypted zip w. URL s/centrale.casa/immagine.pic. URL is geofenced and downloads an obfuscated .js PS loader.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
27
61
@ffforward
Tommy M (TheAnalyst)
4 years
Dear Threat Actor, If you are going to send us encrypted zips with exes in them, could you at least supply the password? Have a great day! Best regards, Victim
Tweet media one
11
7
69
@ffforward
Tommy M (TheAnalyst)
2 years
Alright, maybe not totally objective here, but this blog on #Bumblebee by my awesome coworkers @k3dg3 and @Myrtus0x0 are really great!
@threatinsight
Threat Insight
2 years
Starting in March 2022, Proofpoint observed campaigns delivering a new downloader called #Bumblebee . Threat actors using Bumblebee are associated with #malware payloads that have been linked to follow-on #ransomware campaigns. 🐝...🐝... Learn more:
Tweet media one
0
52
98
1
17
67
@ffforward
Tommy M (TheAnalyst)
7 months
Some #TA576 stuff I worked with last week. Benign Message > Reply > Actor Reply wi. web,app URL > Redir> ZIP > LNK > SyncAppvPublishingServer.vbs LOLBAS > PowerShell > MSHTA from URL > Encrypted PowerShell > Obfusc. PowerShell > Download and Run EXE > Heaven's Gate > Parallax RAT
@threatinsight
Threat Insight
7 months
As Americans gear up for #taxseason , cybercriminals are preparing malicious tax-themed lures. Proofpoint researchers recently identified the return of TA576, a cybercriminal actor that uses tax-themed lures to target accounting and finance organizations.
2
9
17
2
16
64
@ffforward
Tommy M (TheAnalyst)
3 years
"Hmm, all the cool kids are working on Log4j exploits, what am I supposed to do with this #BazaLoader #BazarLoader exe? Wait, I remember this trick from the 90s!" C2s: 185.183.98.39 194.15.112.35 /storage/actual/request Docx: Pif:
Tweet media one
Tweet media two
Tweet media three
8
19
64
@ffforward
Tommy M (TheAnalyst)
4 years
So anyone seen this xls #loader before? Never seen anything like it. cc @James_inthe_box @JAMESWT_MHT @VK_Intel @JRoosen
Tweet media one
Tweet media two
Tweet media three
3
24
62
@ffforward
Tommy M (TheAnalyst)
4 years
And then #TrickBot was like "lol, who cares about #emotet anyway?" and then everything was back to normal. gtag rob42 xls: dll: Config cc @James_inthe_box @JAMESWT_MHT @VK_Intel
Tweet media one
2
25
63
@ffforward
Tommy M (TheAnalyst)
3 years
Update regarding Coop and Visma Esscom. As usual each computer needs to be addressed on-site after a ransomware incident, no matter if they decrypt or restore in any other way. As many of you know, Sweden is quite large.
Tweet media one
Tweet media two
3
18
63
@ffforward
Tommy M (TheAnalyst)
3 years
Anyone got something on this 🇧🇷 #trojan ? ✅ZIP > MSI from many fresh @github accounts ✅Drops over-sized (800MB) trickortreat.exe ✅Persistence via "Startup\setudo_product.lnk" ✅C2 traffic via DoH > TXT records on *.lamboarrived.com *.lamboarrivesssd.com @Namecheap More IOCs>
Tweet media one
Tweet media two
Tweet media three
8
17
60
@ffforward
Tommy M (TheAnalyst)
4 years
. @MsftSecIntel has published an article on the recent #zloader campaigns sent from /aol.com. They claim they have seen maldoc > #CobaltStrike > #ZeroLogon > #Ryuk fully deployed in 45 mins. Haven't seen this reported elsewhere. cc @JAMESWT_MHT @James_inthe_box @VK_Intel
Tweet media one
6
22
60
@ffforward
Tommy M (TheAnalyst)
3 years
TR being predictable and targeting 🇫🇷 with #SquirrelWaffle today. Some changes: doc > xls with new template $WebClient.DownloadFile > urlmon rundll32 > regsvr32 @ET_Labs has some new rules 💪 URLs: XLS/DLL:
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
34
58
@ffforward
Tommy M (TheAnalyst)
3 years
Large #TrickBot gtag leg1 campaign on @onedrive . ISO with lnk+tmp (dll), similar to what has been seen from #BazaLoader previously, but new stuff in the lnk. Links: (incorrect tag) iso+lnk:
Tweet media one
3
22
59
@ffforward
Tommy M (TheAnalyst)
3 years
Pretty cool, #FormBook / @XLoader using HTML smuggling with the blob as base64 inside the attached html-file itself, open it and your browser will drop a zip with the exe. HTML: EXE: HTML > zip > exe run:
Tweet media one
Tweet media two
Tweet media three
2
22
59
@ffforward
Tommy M (TheAnalyst)
3 years
#BazaLoader #BazarLoader back again today with their Universal apps #signed "Systems Accounting Limited". Look for mail with URLs ending with /report.html on @Google or @Azure infra. Installer: DLL:
Tweet media one
1
24
58
@ffforward
Tommy M (TheAnalyst)
3 years
Here we go, #TA505 with #MirrorBlast DL URL: XLS: Payload: 185.225.19.246 C2: 185.176.220.198
Tweet media one
Tweet media two
Tweet media three
Tweet media four
@stoerchl
stoerchl
3 years
Guess there will be a new #MirrorBlast wave soon. Found the following potential domain: - cdn03664-dl-fileshare[.]com The pattern reminds me of #TA505 . "cdn", "dl" and "fileshare" were quite common keywords. Also, the use of a minus to compound the words is very familiar.
3
16
50
4
25
59
@ffforward
Tommy M (TheAnalyst)
7 months
A story in four parts:
Tweet media one
Tweet media two
Tweet media three
Tweet media four
@wdormann
Will Dormann is on Mastodon
7 months
Ah, so it looks like CVE-2024-21412 is to address a bypass for CVE-2023-36025, which was the fact that remote targets inside of a ZIP didn't get SmartScreen love. The fix for CVE-2023-36025 didn't consider the case where a .URL file points to a .URL file.
Tweet media one
4
15
55
1
17
58
@ffforward
Tommy M (TheAnalyst)
3 years
TR having a particularly bad day with XLS delivering #SquirrelWaffle > #CobaltStrike to @joe4security and #QakBot to @hatching_io 😂 Both DLLs up at Extra low detections on XLS and both DLLs today though, so watch out for #ransomware ...
Tweet media one
Tweet media two
@ankit_anubhav
Ankit Anubhav
3 years
Geofenced German malspam #squirrelwaffle (DATOP loader) downloading and running the dll via regsvr, injecting into explorer and adding itself to MS exclude path. Finally leading to CobaltStrike C2 /tuxsecuritybiness.com Latin malzip URL has 1/89 VT
Tweet media one
2
25
42
3
27
58
@ffforward
Tommy M (TheAnalyst)
3 years
@GossiTheDog BTW there is a quite nice blog of recovery here:
0
22
56
@ffforward
Tommy M (TheAnalyst)
1 year
Heads up, #IcedID campaign yesterday where the actor is using #PrometheusTDS URLs directly in the email. If approved by pTDS (anti-bot, IP filtering) the target will be redirected to a page using @reCAPTCHA that will redirect to a second pTDS URL that will smuggle a JavaScript.
Tweet media one
Tweet media two
Tweet media three
1
19
55
@ffforward
Tommy M (TheAnalyst)
3 years
Poor @SwiftOnSecurity , #Dridex is targeting them too 😱 (Yes, this is a real lure)
Tweet media one
5
7
56
@ffforward
Tommy M (TheAnalyst)
4 years
#TeslaCrypt ext 0l0lqq #Ransomware via pwd protected xls 🔥 XLS: ⏬ @googlecloud EXE1 EXE2 Config: @hatching_io nails it again: cc @JAMESWT_MHT @James_inthe_box
Tweet media one
Tweet media two
5
16
55
@ffforward
Tommy M (TheAnalyst)
3 years
#Dridex running with new lures & new xls template with macro on close. xls:
Tweet media one
Tweet media two
5
15
54
@ffforward
Tommy M (TheAnalyst)
3 years
🔥 #UNC2529 tries to deliver #DoubleBack , but I don't think they will get many clicks with this mail template 🧐😂 XLS&DLL: DLL D/L: Very nice run and ID by @hatching_io :
Tweet media one
Tweet media two
0
18
55
@ffforward
Tommy M (TheAnalyst)
2 years
Nice change in spamming from #TA577 (aka TR aka BB) #QBot #Qakbot today 🔥 They now have the name of the spoofed company from the stolen email thread in both the display name and URL. Guess this will make some regex based rules on URLs to break.
Tweet media one
2
24
57
@ffforward
Tommy M (TheAnalyst)
4 years
#Emotet spinning up again via stolen mail threats and attached encrypted zips. Only english seen so far. cc @James_inthe_box @JAMESWT_MHT @JRoosen @cocaman
Tweet media one
5
25
54
@ffforward
Tommy M (TheAnalyst)
4 years
(Thread 1/many) Looking at probably the most advanced #phishing setup I have seen. Sending in limited rate from compromised @Office365 accounts. Uses both redirect and phish on *.app-[nnn].cloud registered with @Namecheap and @namesilo . Undetected by @Office365 @MSThreatProtect
Tweet media one
Tweet media two
Tweet media three
3
22
55
@ffforward
Tommy M (TheAnalyst)
3 years
New week, new #BazarLoader from #TA551 / #Shathak . Usual passworded zip with doc. DLL from /brookscargos.com DOC: DLL: Perfect @hatching_io run: "Thanks in advance ?" and "f*ck u" 🤣
Tweet media one
Tweet media two
Tweet media three
1
17
53
@ffforward
Tommy M (TheAnalyst)
4 years
#DiamondFox #fail Original attachment: C2 /etablebuterline.xyz/dimpan/gate.php cc @JAMESWT_MHT
Tweet media one
Tweet media two
1
13
55
@ffforward
Tommy M (TheAnalyst)
3 years
TR back to dropping #QakBot from their #EtterSilent sheets again. Some changes in this version so config extractors needs to be fixed, @hatching_io was very fast to fix it as usual 💪 XLSB: DLL: Config:
Tweet media one
5
22
53
@ffforward
Tommy M (TheAnalyst)
3 years
TR targeting 🇮🇹 with #SquirrelWaffle today. Very picky on who they deliver the DLL to. #SquirrelWaffle is know to drop #CobaltStrike , so watch out for #ransomware .
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
18
54
@ffforward
Tommy M (TheAnalyst)
3 months
I'm so proud of my coworkers and friends in both @proofpoint @threatinsight and @Cryptolaemus1 and the rest of the community to make this happen. By working together, we cannot only protect our customers, but people and organizations everywhere!
0
13
54
@ffforward
Tommy M (TheAnalyst)
4 years
1/4🔥 #BazarLoader > #BazarBackdoor #KEGTAP via social engineering. Email from /mail.com and /gmx.com senders contains fake PDF flower invoice that mentions (not links) /roseworld.us. The website is completely fake too, and asks you do download an xlsm to change your order.
Tweet media one
Tweet media two
Tweet media three
1
29
53
@ffforward
Tommy M (TheAnalyst)
4 years
Friday #zloader from /aol.com switched to xlsm, made wonders to AV detections. s/b-dvs.com/server.php s/b-design.studio/errors.php s/taigen-landscape.com/wp-crunch.php s/taigen-landspace.com/logs.php cc @James_inthe_box @JAMESWT_MHT @VK_Intel @JRoosen
Tweet media one
Tweet media two
Tweet media three
1
15
53
@ffforward
Tommy M (TheAnalyst)
3 years
File with similar basic behavior uploaded from UA as "Crypted.exe" on the 14th: Needs to be run from %temp% as Stage1.exe, however I'm only getting a loop of Stage1 > Stage2 > Stage1 etc and no traffic, so no confirmation it's the real thing.
@MsftSecIntel
Microsoft Threat Intelligence
3 years
Microsoft identified a unique destructive malware operated by an actor tracked as DEV-0586 targeting Ukrainian organizations. Observed activity, TTPs, and IOCs shared in this new MSTIC blog. We'll update the blog as our investigation unfolds.
62
1K
2K
2
18
54
@ffforward
Tommy M (TheAnalyst)
1 year
The #Bumblebee MSI that is dropped is this: It contains this PS1 that contains the Base64-encoded and compressed payload:
Tweet media one
@threatinsight
Threat Insight
1 year
#TA581 returned to the email threat landscape after an almost month-long absence to distribute Cisco Meraki security alert themed emails delivering #Bumblebee malware.
Tweet media one
Tweet media two
4
22
45
1
21
53
@ffforward
Tommy M (TheAnalyst)
3 years
Very interesting #IcedID distro. A fake @WordPress plugin "wp-roilbask" that is spoofing the "WP Rollback" plugin. They even took the time to edit the readme (where they call it roilback instead). So far I have found 18 compromised sites with this!
Tweet media one
Tweet media two
Tweet media three
@executemalware
ExecuteMalware
3 years
As mentioned previously, I received a few emails with links that download .xll files. I was unable to launch the payload in my lab so I couldn't get many IOCs. Identified earlier by @ffforward as likely #icedid #bokbot Here what I saw:
1
8
23
4
25
53
@ffforward
Tommy M (TheAnalyst)
3 years
#Conti choose to publish victims today after a period of low activity. Sure, the gangs starts to come back from Old New Year holidays, but it is really just a way to show that they don't care about yesterdays #REvil #ransomware raids?
Tweet media one
1
19
52
@ffforward
Tommy M (TheAnalyst)
3 years
#QakBot obama137 has been hitting hard today. Just like last two weeks they are running link-based zip > xlsb instead of attachments. URL is domain.tld/doc/*.zip where * is wildcard including dirs. zip+dll URLs: xlsb+dll:
Tweet media one
Tweet media two
Tweet media three
Tweet media four
3
18
52
@ffforward
Tommy M (TheAnalyst)
4 years
Early #BazarStrike delivering #CobaltStrike beacon today. *.getresponsepages.com > Google drive again. Low detections as usual. #Signed "Orca System" EXE Config flawless by @hatching_io as usual: cc @JAMESWT_MHT @James_inthe_box
Tweet media one
Tweet media two
Tweet media three
1
30
53
@ffforward
Tommy M (TheAnalyst)
4 years
The current #emotet spam level very high, and the percentage of encrypted zips is very high too. All orgs need to detect and/or block these. For @Office365 you either need Safe Attachments (MDO/E5 needed) enabled or handle encrypted attachments in mail flow manually.
1
17
50
@ffforward
Tommy M (TheAnalyst)
4 years
I get it, new year and you expect new threats. So how about a new #zloader from .docm attachment with macro on close? DOCM: DLL: Full config: cc @James_inthe_box @JAMESWT_MHT @VK_Intel
Tweet media one
Tweet media two
Tweet media three
Tweet media four
3
17
51
@ffforward
Tommy M (TheAnalyst)
2 years
TR/ #TA577 doing #qbot #qakbot on @onedrive today. Thousands of unique URLs ☹️
Tweet media one
2
18
53
@ffforward
Tommy M (TheAnalyst)
3 years
❤️To all my fellow researchers out there❤️ Roses are red Violets are blue Threat actors feel fear Because of you
0
5
51
@ffforward
Tommy M (TheAnalyst)
3 years
Speaking of which, here is an #Ousaban 🇧🇷 banker w. @policiafederal lure that uses @Azure both as a redirect and landing, and the landing page has the zipped malware stored as a blob in the html itself. 2nd stage:
Tweet media one
Tweet media two
Tweet media three
Tweet media four
@MsftSecIntel
Microsoft Threat Intelligence
3 years
There has been a spike in email campaigns using HTML smuggling to deploy banking Trojans, RATs, and ransomware. Attackers use this technique to build malware on a device via the browser instead of passing payloads directly through the network. Details:
10
287
552
4
20
48
@ffforward
Tommy M (TheAnalyst)
4 years
#Bazarloader #Bazaloader #Baza #KEGTAP inc Google Docs > Drive. Subject "Re: [company] termination list" EXE #Signed "OOO Inversum" IOC /cleancarwashlla.org /thecarwash-zone.com /envirodedge.com h/t @Scoobs_McGee cc @James_inthe_box @JAMESWT_MHT @VK_Intel
Tweet media one
4
17
49
@ffforward
Tommy M (TheAnalyst)
4 years
Heads up, #emotet is back from old new year holiday and has started spamming. Seeing encrypted zips targeting 🇪🇸and 🇮🇹 so far. cc @JAMESWT_MHT @James_inthe_box @JRoosen @Cryptolaemus1
Tweet media one
3
20
48