Legacy May Kill, (Sun, Aug 3rd)

Just saw something that I thought was long gone. The username “pop3user” is showing up in our telnet/ssh logs. I don&#;x26;#;39;t know how long ago it was that I used POP3 to retrieve e-mail from one of my mail servers. IMAP and various webmail systems have long since replaced this classic email protocol. But at least this one attacker is counting on someone still having a “pop3user” configured.

Continue reading Legacy May Kill, (Sun, Aug 3rd)

Posted in Uncategorized

Scattered Spider Related Domain Names, (Thu, Jul 31st)

This week, CISA updated its advisory on Scattered Spider. Scattered Spider is a threat actor using social engineering tricks to access target networks. The techniques used by Scattered Spider replicate those used by other successful actors, such as Lapsus$;. Social engineering does not require a lot of technical tools; creativity is key, and defenses have a hard time keeping up with the techniques used by these threat actors.

Continue reading Scattered Spider Related Domain Names, (Thu, Jul 31st)

Posted in Uncategorized

Triage is Key! Python to the Rescue!, (Tue, Jul 29th)

When you need to quickly analyze a lot of data, there is one critical step to perform: Triage. In forensic investigations, this step is critical because it allows investigators to quickly identify, prioritize, and isolate the most relevant or high value evidence from large volumes of data, ensuring that limited time and resources are focused on artifacts most likely to reveal key facts about an incident. Sometimes, a quick script will be enough to speed up this task.

Continue reading Triage is Key! Python to the Rescue!, (Tue, Jul 29th)

Posted in Uncategorized

Parasitic Sharepoint Exploits, (Mon, Jul 28th)

Last week, newly exploited SharePoint vulnerabilities took a lot of our attention. It is fair to assume that last Monday (July 21st), all exposed vulnerable SharePoint installs were exploited. Of course, there is nothing to prevent multiple exploitation of the same instance, and a lot of that certainly happened. But why exploit it yourself if you can just take advantage of backdoors left behind by prior exploits? A number of these backdoors were widely publicised. The initial backdoor “spinstall0.aspx”, was frequently observed and Microsoft listed various variations of this filename [1].

Continue reading Parasitic Sharepoint Exploits, (Mon, Jul 28th)

Posted in Uncategorized