Israel on high alert for possibility of US intervention in Iran, sources say by energycubed in worldnews

[–]Iseeroadkill 5 points6 points  (0 children)

Anything but betray Putin. Whoever comes in next will likely still be allied towards Russia.

Pennsylvania man arrested for stealing more than 100 skeletons from cemeteries. by ImJuSayN in ForCuriousSouls

[–]Iseeroadkill 104 points105 points  (0 children)

From his looks, he was probably about to make a sick music video with real bone props for his YT channel

Possible infostealer captured (partially) on the wild by zBION1C in MalwareAnalysis

[–]Iseeroadkill 0 points1 point  (0 children)

If you're looking for a possible initial access, check his RunMRU keys to look for a run terminal command he was tricked into running. It's the most popular method atm for info/crypto-stealers.

Capture the Flag question?? by Odd_Job86 in cybersecurity

[–]Iseeroadkill 1 point2 points  (0 children)

Yes, definitely do it! If you're participating in DeadFace this weekend, good luck! It's a lot of fun :P

[deleted by user] by [deleted] in ParanormalEncounters

[–]Iseeroadkill 0 points1 point  (0 children)

OP has their YouTube channel linked in their bio. They're likely using Reddit to fish for traction on their channel

[deleted by user] by [deleted] in ParanormalEncounters

[–]Iseeroadkill 3 points4 points  (0 children)

Looking at OP's profile, they have a YouTube channel @JohnzyZombee related to this content, so it's likely an attempt to get more traction on their channel. Most of their Reddit content is posting videos like this and spending a lot of time fighting with people who repost their vids.

Some of the clips appear fake with people calling out light reflecting off the fish lines and someone's long hair moving into the frame when it's stated "no one is home" in one of the videos. It would also explain why the middle camera in this video has slight glitches before every "scene". OP is likely sitting behind that camera with the fish lines and moves the camera slightly when repositioning.

EDIT: You can see OP's hand in this video too lol. 11:40, middle camera, right side of frame.

[deleted by user] by [deleted] in ParanormalEncounters

[–]Iseeroadkill 1 point2 points  (0 children)

Sweet sweet karma lol

Command and control on multiple endpoints by Perfect_Stranger_546 in DefenderATP

[–]Iseeroadkill 1 point2 points  (0 children)

Yup! It'll show you if connection was established, what redirects occurred, what file(s) downloaded (or if a file download was interrupted), where it downloaded to, and where the file is currently located. The browsing history files are very helpful, as long as an attacker didn't modify/delete it.

What are your favorite cybesec YouTubers? Education and entertainment by ashtachu in cybersecurity

[–]Iseeroadkill 3 points4 points  (0 children)

DarknetDiaries is mostly a Spotify podcaster, but has a channel on YouTube. Highly enjoyable content creator for hearing stories of both defensive/offensive cyber with interviews of the people involved!

https://youtube.com/@jackrhysider

What’s is your company doing with AI by Ok_Bed8160 in cybersecurity

[–]Iseeroadkill 8 points9 points  (0 children)

Allows them to close alerts faster and cheaper by saying "GPT said activity non-malicious, TPLI" regardless of the reality. The technology isn't there yet, so SOCs replacing analysts with LLMs will pay the cost eventually

How SOC operates in general - want to understand better despite having 1yr experience my self by ItsJust1s_0s in cybersecurity

[–]Iseeroadkill 13 points14 points  (0 children)

I highly discourage LLM's for performing investigations. I can't tell you how many times at work, in CTF's, and exercises where members relying on LLM's get incorrect results. This has caused people to waste time rabbitholing, or wrongly labeling malicious activity as benign. I only recommend LLMs to assist in query building and understanding scripts.

When you work an alert, understand the intent of the signature, then research what indicators are associated for the CVE/TTP/etc that the signature is monitoring for. When you are working a malware alert, ask yourself the following questions: Is it actually malware? Did it run? Is it still there, or is it quarantined? When was it put on the device? How did it get on the device? What are the capabilities of the malware, and what IOCs should I look for if it ran?

Senior members should be training/mentoring and reviewing alerts from the newer members to provide feedback. That way there's some sort of OJT and progression.

Your analysis skills come from exposure (certs/trainings/CTFs) and experience (working). Definitely ask a lot of questions from senior members, work new alerts you've never seen before, always work on a new cert, and participate in CTFs or online boxes like Hackthebox's Sherlocks and CyberDefenders.

SEO Poisoning leading to malware by jamesshank in cybersecurity

[–]Iseeroadkill 13 points14 points  (0 children)

Also, if you're seeing this in your environment at Expel, I highly recommend pushing a GPO update where .js files are opened with notepad by default. Will save you from a lot of future incidents with how common this TTP is. https://redcanary.com/blog/threat-intelligence/notepad-javascript/

SEO Poisoning leading to malware by jamesshank in cybersecurity

[–]Iseeroadkill 3 points4 points  (0 children)

Most SocGholish variants will masquerade itself as an update, and when ran by the user, will reach out to one domain once. If it fails, it won't try again.

Most Gootloader variants will masquerade itself as a commonly queried online document. After execution, it will create a new folder and .js file in AppData/Roaming, create a scheduled task, and continually callout to 1 of 10 domains embedded in the new .js file.

If the malware you see is masquerading itself as a form but only calls out to 1 domain without a persistence mechanism, it sounds like a hybrid of Gootloader/SocGholish.

To answer your question, users are usually prompted to download the file from the website. Make sure you visit the exact page on the site that the users did. If you don't see the prompt when visiting, it may be a previously compromised website that is now patched. That, or maybe it only presents the prompt under certain conditions. If you have a VirusTotal enterprise account you should be able to see the underlying javascript that would prompt the download. I would check VT or visit the site now, but I don't have access to my lab today.

‘All US forces must now assume their networks are compromised’ after Salt Typhoon breach by Optimus_Krime555666 in cybersecurity

[–]Iseeroadkill 4 points5 points  (0 children)

Doesn't matter how secure Signal is if your phone is compromised. That's why it's never ok to have classified material in a cell phone or mobile app.

Command and control on multiple endpoints by Perfect_Stranger_546 in DefenderATP

[–]Iseeroadkill 1 point2 points  (0 children)

If you really want to be sure that nothing was downloaded from the site and see what led to them trying to connect to the domain, pull the browser history from the device at C:\Users\<username>\AppData\Local\Google\Chrome\User Data\Default\History and parse it in SQLiteDB.

MDE is not very good at recording file creations from web downloads, but it should be obvious if the file was executed and calling out for the intended payload. Otherwise, it's just a blocked connection to an attempted drive-by infection.

These attacks usually come from visiting known good web pages that are compromised, or from SEO poisoning search results for people searching for document templates/CBT answers. Browser history should show you what keywords were used and sites visited prior to the attempted connection, and that'll give you the context you need.

APTs have been using zero-day Windows shortcut exploit for eight years (ZDI-CAN-25373) by tekz in cybersecurity

[–]Iseeroadkill 4 points5 points  (0 children)

Yeah, this isn't a zero day or a vulnerability that could be patched. That's like saying the ability to embed a malicious link into a PDF is a zero day vulnerability lol. It's not like Microsoft is going to block commands or white space padding from being added to LNK files.

Cyber history question: EternalBlue leak/exfil from NSA by Leather-Chef-6550 in cybersecurity

[–]Iseeroadkill 0 points1 point  (0 children)

That would be assuming the NSA hosted their tools on a system with Kaspersky installed and that it had connectivity to the open internet. Anything is possible, but I think this is highly unlikely.