Using Python to unearth a goldmine of threat intelligence from leaked chat logs

Credit to Author: Paul Oliveria| Date: Wed, 01 Jun 2022 18:00:00 +0000

Dealing with a great amount of data can be time consuming, thus using Python can be very powerful to help analysts sort information and extract the most relevant data for their investigation. The open-source tools library, MSTICpy, for example, is a Python tool dedicated to threat intelligence. It aims to help threat analysts acquire, enrich, analyze, and visualize data.

The post Using Python to unearth a goldmine of threat intelligence from leaked chat logs appeared first on Microsoft Security Blog.

Read more

Custom PowerShell RAT targets Germans seeking information about the Ukraine crisis

Credit to Author: Threat Intelligence Team| Date: Mon, 16 May 2022 10:00:00 +0000

Malwarebytes Threat Intelligence has uncovered an attack using the lure of information about the war in Ukraine to target people in Germany.

The post Custom PowerShell RAT targets Germans seeking information about the Ukraine crisis appeared first on Malwarebytes Labs.

Read more

APT34 targets Jordan Government using new Saitama backdoor

Credit to Author: Threat Intelligence Team| Date: Tue, 10 May 2022 20:49:30 +0000

On April 26th, we identified a suspicious email that targeted a government official from Jordan’s foreign ministry. The email contained a malicious Excel document that drops a new backdoor named Saitama. Following our investigation, we were able to attribute this attack to the known Iranian Actor APT34. Also known as OilRig/COBALT GYPSY/IRN2/HELIX KITTEN, APT34 is…

The post APT34 targets Jordan Government using new Saitama backdoor appeared first on Malwarebytes Labs.

Read more

Discover the anatomy of an external cyberattack surface with new RiskIQ report

Credit to Author: Christine Barrett| Date: Thu, 21 Apr 2022 16:00:00 +0000

Learn how supply chains, shadow IT, and other factors are growing the external attack surface—and where you need to defend your enterprise.

The post Discover the anatomy of an external cyberattack surface with new RiskIQ report appeared first on Microsoft Security Blog.

Read more

Colibri Loader combines Task Scheduler and PowerShell in clever persistence technique

Credit to Author: Threat Intelligence Team| Date: Tue, 05 Apr 2022 18:36:35 +0000

We discovered an interesting trick used by Colibri Loader to survive reboots that takes advantage of a legitimate command in PowerShell.

The post Colibri Loader combines Task Scheduler and PowerShell in clever persistence technique appeared first on Malwarebytes Labs.

Read more