InvictusIR Profile Banner
Invictus Incident Response Profile
Invictus Incident Response

@InvictusIR

Followers
2K
Following
469
Media
95
Statuses
371

Helping organizations respond to cyber incidents in the cloud | ๐Ÿ†˜ 24/7 support https://t.co/zfF62gimvm | ๐Ÿ“š Academy https://t.co/GH0u8tmjXJ

โ˜๏ธ
Joined May 2021
Don't wanna be here? Send us removal request.
@InvictusIR
Invictus Incident Response
5 months
๐Ÿซ Do you prefer live training events, we've got you covered! You can join us and ask all your questions at our select live training events. @brucon @defcon @BlackHatEvents . โœ๏ธ Sign-up via:
Tweet media one
1
0
3
@InvictusIR
Invictus Incident Response
16 days
Invictus ๐Ÿ’™ K8S. ๐Ÿ†• We have developed a new tool KubeForenSys, for Kubernetes forensics in AKS. Check out the blog and grab the tool .๐Ÿ“œ ๐Ÿ› ๏ธ #stayInvictus #CloudIncidentResponse #kubernetes #aks.
Tweet card summary image
github.com
A Kubernetes Forensic Collection Framework for Azure Kubernetes Service - invictus-ir/KubeForenSys
0
11
31
@InvictusIR
Invictus Incident Response
29 days
๐Ÿšจ Volume 3 | Profiling TradeTraitor (DPRK) ๐Ÿšจ . Our latest and greatest blog in our series on Cloud Threat Actors. This one is on the the infamous DPRK-nexus crew behind billion-dollar cryptocurrency heists. Check it out: . #stayInvictus.
0
4
9
@InvictusIR
Invictus Incident Response
2 months
We've just published our latest threat actor profile on #LaundryBear.Check it out if you want to learn how they work, who they target and their TTPs. #stayInvictus #CloudIncidentResponse.
0
6
19
@InvictusIR
Invictus Incident Response
2 months
Thanks for reading and if you're interested in learning more about cloud incident response, make sure to follow us or reach out!.
0
0
3
@InvictusIR
Invictus Incident Response
2 months
Lessons learned:.- From a detection perspective the UAL is often ignored, make sure you build detections for Teams/SharePoint/Exchange activities.- Microsoft please close the visibility problems with the Global Address List (GAL). Almost anyone can download this and there's no.
3
4
16
@InvictusIR
Invictus Incident Response
2 months
This activity can be detected, but only if the Graph API is used to perform this activity, per Microsoft's documentation. (
Tweet media one
1
2
9
@InvictusIR
Invictus Incident Response
2 months
The Microsoft blog mentions that the TA also goes for Microsoft Teams messages.
Tweet media one
1
1
6
@InvictusIR
Invictus Incident Response
2 months
Another interesting observation is that this TA limits itself to the cloud only it doesn't try to move laterally to on-premise where the defenders have a better chance of catching the TA.
1
2
5
@InvictusIR
Invictus Incident Response
2 months
The AIVD/MIVD also mentions that the threat actor exfiltrates data from SharePoint, you can search for the FileDownloaded operation in the UAL to find individual file downloads. If the TA uses something like OneDrive to sync folders the Operation in the UAL will be
Tweet media one
1
2
7
@InvictusIR
Invictus Incident Response
2 months
It's also mentioned that Laundry Bear tries to abuse Delegated access in Exchange to gain access to additional email accounts. You can search for 'Add-MailboxPermission' operation in the UAL to find this activity.
1
1
5
@InvictusIR
Invictus Incident Response
2 months
From a Forensics perspective a few things stand out, the Global Address List (GAL) was collected, that's how they got names, functions and addresses from (most) police officers. There is no evidence of this in any available logs, the Unified Audit Log (UAL) does not record this
Tweet media one
1
4
6
@InvictusIR
Invictus Incident Response
2 months
From a CTI perspective it's interesting to see state State-sponsored actors (๐Ÿ‡ท๐Ÿ‡บ) relying on the cybercrime ecosystem to gain access to their targets. Possible motives are plausible deniability, because the techniques aren't unique which makes attribution difficult.
Tweet media one
1
1
2
@InvictusIR
Invictus Incident Response
2 months
Initial Access via Session Cookies, this happens quite frequently either via AiTM attacks or other means. Detection for this is difficult because this is post-authentication and the identity provider (Entra ID) already verified the user and their claims.
1
1
5
@InvictusIR
Invictus Incident Response
2 months
Before we begin, the source of this information is the report by Dutch Intelligence ๐Ÿ‡ณ๐Ÿ‡ฑ( .And Microsoft (.
1
1
6
@InvictusIR
Invictus Incident Response
2 months
Allright let's do this, a thread on Laundry Bear aka Void Blizzard. This group compromised the Dutch National Police. Let's dive into thing from a cloud IR/forensics perspective ๐Ÿงต.
1
26
79
@InvictusIR
Invictus Incident Response
2 months
We've started a new series on Cloud focused threat actors, today Part I on #JavaGhost. Check it out, if you want to learn how they operate, who they target and how you can defend against them. #stayInvictus #CloudIncidentResponse #JavaGhost.
0
6
27
@InvictusIR
Invictus Incident Response
2 months
RT @cybershtuff: ๐Ÿšจ New blog from @datadoghq on fresh AWS TTPs! Me and Team @InvictusIR pivoted & enriched their infra data to uncover theโ€ฆ.
Tweet card summary image
securitylabs.datadoghq.com
A cloud attack targeting Amazon SES and persistence via AWS Lambda, AWS IAM Identity Center and AWS IAM
0
4
0
@InvictusIR
Invictus Incident Response
3 months
๐Ÿšง Dive into the final part of our blog series on preparing for cloud incidents. If you want to learn practical tips and things you can do right now to make Cloud Incident Response life easier this one is for you. .
0
7
25
@InvictusIR
Invictus Incident Response
3 months
๐Ÿ”„Time to update your favorite cloud IR tool, the Microsoft Extractor Suite! . ๐”๐ฉ๐๐š๐ญ๐ž-๐Œ๐จ๐๐ฎ๐ฅ๐ž -๐๐š๐ฆ๐ž ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ-๐„๐ฑ๐ญ๐ซ๐š๐œ๐ญ๐จ๐ซ-๐’๐ฎ๐ข๐ญ๐ž. Release notes for version 3.0.4. ๐Ÿ†• .- Added -UserIds parameter to Get-Users for filtering by specific user IDs. -.
0
7
30
@InvictusIR
Invictus Incident Response
4 months
What do you get when you combine BlackBasta leaks and Scattered Spider? An awesome new blog, where we discuss how these two groups operate in the cloud and their TTPs. #stayInvictus #CloudIncidentResponse #CTI #DFIR.
0
7
29