Summary
— Welcome to Security Soup’s continuing news coverage of highlights from the previous week. This list is not intended to be an exhaustive source, but simply a collection of items I found interesting throughout my weekly research. The summaries are provided with links for the reader to drill down into particular topics according to their own interests. Thank you to all of the contributors for this great content!
Industry News and Reports
- Introducing the security configuration framework: A prioritized guide to hardening Windows 10
- Group-IB Cybercrime Trends 2018 Report
- Check Point: March 2019’s Most Wanted Malware: Cryptomining Still Dominates
- Akamai: 2019 State of the Internet / Security: Credential Stuffing: Attacks and Economies
- Implications of IT Ransomware for ICS Environments
- RiskIQ’s 2019 Tax Season Threat Roundup
- Rapid7 – Q4 Threat Report: Analyzing the Top 3 Advanced Threats and Detection Techniques
Tools and Tips
- Blue + Red: An Infosec Purple Pyramid
- Examining Different Approaches to Architecting Deception Technology
- GHidra vs. IDA
- Advanced Windows Logging – Finding What AV Missed (Video by @IppSec)
- Simple PowerShell WebServer To Host an HTA Payload
- Prediction of Adversarial Behavior: Exploring the quantitative characteristics of your adversary
- Changes to Ticket-Granting Ticket (TGT) Delegation Across Trusts in Windows Server (AskPFEPlat edition)
- regrippy — a modern Python 3 alternative to RegRipper
- VirusTotal for Investigators (PDF)
- Searching for Malware Samples
- Exploiting PrivExchange
- Case Study: Password Analysis with BloodHound
- Here Be Dragons: Reverse Engineering with Ghidra – Part 0 [Main Windows & CrackMe]
- OSINT- Information Gathering
Threat Research – Malware, Phishing, and other campaigns in the wild
- Carbon Black Threat Intelligence Notification: Hunting APT28 Downloaders
- Mirai Variant Compiled for New Processors Seen in the Wild
- Spammed PNG file hides LokiBot
- Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware
- ServHelper malware variant employs Excel to drop signed payload
- Who is GOSSIPGIRL? — Chronicle looks at stuxnet-related threat groups
- Baldr: a new stealer on the market
- Researchers Uncover New Version of the Infamous Flame Malware
- Credential Dumping Campaign Hits Multinational Corporations
- Project TajMahal – a sophisticated new APT framework
- Gaza Cybergang Group1 Levearages Pastebin and Github for Staging
- TRITON Actor TTP Profile, Custom Attack Tools, Detections, and ATT&CK Mapping
- EMOTET spread in Chile impacted hundreds of users and targeted financial/banking services
- US-CERT Notification on North Korean-linked HOPLIGHT malware
- New Spear Phishing Campaign Operated by the MuddyWater Group
- Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability
- Sextortion profits decline despite higher volume, new techniques
- Looking Into Anatova Ransomware
- Malware Debugs Itself to Prevent Analysis
- When You Unsubcribe to these Emails, You ‘Subscribe’ to the Loda RAT
- Miner Malware Spreads Beyond China, Uses Multiple Propagation Methods Including EternalBlue, Powershell Abuse
- Talos Threat Roundup for April 5 to April 12
- The Ping is the Thing: Popular HTML5 Feature Used to Trick Chinese Mobile Users into Joining Latest DDoS Attack
- Finding Weaknesses Before the Attackers Do
- Sqlrat analysis
- Emotet scales use of stolen email content for context-aware phishing
Vulnerabilities and Exploits
- Circumventing Windows Defender ATP’s user-mode APC Injection sensor from Kernel-mode
- SQL Injection in Advance Contact Form 7 DB
- Dragonblood: A Security Analysis of WPA3’s SAE Handshake
- CVE-2019-0227: Expired Domain to Remote Code Execution in Apache Axis
- POC – CARPE (DIEM): CVE-2019-0211 Apache Root Privilege Escalation
- Virtually Unlimited Memory: Escaping the Chrome Sandbox
Breaches, Government, and Law Enforcement
- Impact of Iran Terrorist Designation for Multinational Orgs
- Yahoo strikes $117.5 million data breach settlement
- U.S. Cyber Resiliency Act introduced to Fund Defense for State and Local Governments
- Space ISAC plans to elevate the industry’s awareness of cyberthreats
- WikiLeaks Founder Julian Assange Arrested After Ecuador Withdraws Asylum