Curtis
cybershtuff.bsky.social
Curtis
@cybershtuff.bsky.social
24 followers 74 following 13 posts
Cloud, Incident Response, Threat Intelligence | ثريت انتل | @Invictus-ir.com | Previously U42 and PwC GTI
Posts Media Videos Starter Packs
Reposted by Curtis
🎉BEHOLD! THE AGENDA! 🎉

The inaugural agenda features 15 talks detailing operational updates on the threat landscape, matters of attribution, and unique explorations of unconventional manifestations of state presence.

Get registered quick!!!

stateofstatecraft.com/agenda
Cloud Labs is live!

🏗️ Build or increase your cloud incident response skills with realistic labs and scenarios.

Register for Cloud Labs: cloudlabs.invictus-ir.com
Cloud Labs - Choose the plan that fits your needs
cloudlabs.invictus-ir.com
💙Microsoft Extractor Suite v4 is here

𝘜𝘱𝘥𝘢𝘵𝘦-𝘔𝘰𝘥𝘶𝘭𝘦 -𝘕𝘢𝘮𝘦 𝘔𝘪𝘤𝘳𝘰𝘴𝘰𝘧𝘵-𝘌𝘹𝘵𝘳𝘢𝘤𝘵𝘰𝘳-𝘚𝘶𝘪𝘵𝘦

Learn more about the new features in the blog and thanks everyone that contributed!

invictus-ir.com/news/black-h...

#stayInvictus #CloudIncidentResponse #DFIR
Black Hat First Look: Meet the New Microsoft Extractor Suite v4
invictus-ir.com
Reposted by Curtis
Why am I so unimpressed by these strikes? Israel and the US have failed to target significant elements of Iran's nuclear materials and production infrastructure. RISING LION and MIDNIGHT HAMMER are tactically brilliant, but may turn out to be strategic failures. 🧵 1/17
#CharmingKitten #APT42 #TA453

Hash:
87144d0aa002a87376b673f7d0c0eb88

C2:
Telegram Bot used for error messages and auto-start messaging to the operator
computerlearning.ddns./net

Pivots:
bookstoragestore./com
lastfilterfile/.info
78.159.117./177
78.159.117./175
185.132.176./241
154.44.186./106
Reposted by Curtis
Dutch intelligence discover a new Russian APT—LAUNDRY BEAR

www.aivd.nl/documenten/p...

Microsoft calls it Void Blizzard. Their report is here: www.microsoft.com/en-us/securi...
The limited IOCs on this pointed toward an ORB network...nice to see some reporting that supports attribution.
Commvault said it was hacked by an APT and was ridiculed by some.

That APT turned out to be Silk Typhoon, which accessed Commvault's Azure cloud system back in February
SCOOP: Commvault was accessed by Silk Typhoon, the same Chinese cyberespionage group that infiltrated the Treasury Department late last year, I’m told.⬇️
This isn’t recycled noise on JavaGhost. It surfaces the often-overlooked details responders and CTI analysts actually need.

Practical takeaways include:
✔️ Mapped TTPs
✔️ IR checklist
✔️ Actor context & relevancy

invictus-ir.com/news/profili...

#CTI #CloudSecurity #AWS #DFIR #JavaGhost
Call-back Proxy Network: 103.131.213[.]89 | 182.185.156[.]45 – likely a mix of anonymous activity and normal activity.
Mass SMTP Tester: 134.199.148[.]132 – banner previously responded with Mass SMTP Tester header.
Reposted by Curtis
ATT&CK v17 is now live! This release includes the first version of the ESXi platform, a pile of defensive upgrades, and fresh content across Enterprise, Mobile, and ICS.

Check out our blog post describing the changes by Amy Robertson & @whatshisface.bsky.social at medium.com/mitre-attack....
ATT&CK v17: New Platform (ESXi), Collection Optimization, & More Countermeasures
By: Amy Robertson and Adam Pennington
medium.com
🚨 New blog: BlackBasta’s leaks show how ransomware crews still exploit hybrid environments while Scattered Spider leans fully into cloud.

Two actors, two strategies. What it means for IR, cloud defense, and ransomware readiness.

👉 invictus-ir.com/news/cloud-h...

#DFIR #CloudSecurity #CTI
Cloud Heavy, Hybrid Ready: Lessons from BlackBasta and Scattered Spider
invictus-ir.com
🔍 New Blog: Essential Cloud Logs for Incident Response

🪵 Are you collecting the right logs for cloud security incidents? We break down the must-have logs to detect, investigate, and respond effectively in the cloud.

🔗 www.invictus-ir.com/news/cloud-i...

#dfir #aws #microsoft #google
Cloud Incident Readiness: Key logs for cloud incidents
www.invictus-ir.com
🚨 New Blog: Forensic Analysis of eM Client 🚨

If you handle BEC investigations, you've probably encountered eM Client more than once. We break down the forensic traces this application leaves behind.

🔍 Read now: www.invictus-ir.com/news/forensi...

#CyberSecurity #DFIR #BEC #ThreatIntel #CTI
Deep Dive: Forensic Analysis of eM ClientPermissions Table
www.invictus-ir.com
🚨 New Blog Alert: “Locked Out, Dropboxed In: When BEC Threats Innovate” 🚨

Dive into an intriguing BEC attack and discover how this threat actor navigated a cloud environment to evade detection. We’ve also mapped the TTPs and shared IOCs on our GitHub.

👉 www.invictus-ir.com/news/locked-...
www.invictus-ir.com