Curtis Profile
Curtis

@cybershtuff

Followers
471
Following
2K
Media
18
Statuses
184

Cloud, Incident Response, Threat Intelligence | ثريت انتل | OSINT | @InvictusIR | Previously U42 and PwC GTI

Joined June 2019
Don't wanna be here? Send us removal request.
@cybershtuff
Curtis
24 days
RT @InvictusIR: 💙Microsoft Extractor Suite v4 is here. 𝘜𝘱𝘥𝘢𝘵𝘦-𝘔𝘰𝘥𝘶𝘭𝘦 -𝘕𝘢𝘮𝘦 𝘔𝘪𝘤𝘳𝘰𝘴𝘰𝘧𝘵-𝘌𝘹𝘵𝘳𝘢𝘤𝘵𝘰𝘳-𝘚𝘶𝘪𝘵𝘦. Learn more about the new features in….
0
4
0
@cybershtuff
Curtis
1 month
Pivoting on #UNC6148 infra (low confidence finds):. 149.248.76./220.195.85.115./143 -- takesurvey./online, carlads./online.168.100.9./181 -- wg-aff./website. The reverse shell IP (64.52.80./80) has some historical indicators of likely being used for EvilProxy phishing.
@Mandiant
Mandiant (part of Google Cloud)
1 month
A financially motivated threat actor, #UNC6148, is targeting fully patched, end-of-life SonicWall SMA 100 appliances. In this latest activity, they deploy a new persistent backdoor we track as OVERSTEP. 🔗 Full details and defensive recommendations:
Tweet media one
0
0
2
@grok
Grok
1 day
Join millions who have switched to Grok.
31
39
446
@cybershtuff
Curtis
2 months
RT @InvictusIR: 🚨 Volume 3 | Profiling TradeTraitor (DPRK) 🚨 . Our latest and greatest blog in our series on Cloud Threat Actors. This one….
0
4
0
@cybershtuff
Curtis
2 months
RT @ArmsControlWonk: Why am I so unimpressed by these strikes? Israel and the US have failed to target significant elements of Iran's nucle….
0
2K
0
@cybershtuff
Curtis
2 months
🔍 Detect.Query Entra ID logs for Teams/1.3.00.30866 agent.Spot device-app mismatch & targeted app ID access. 🕵️ Investigate.Correlate w/ AWS IPs & spray patterns.Check post-comp activity (e.g. mailbox rules). 🛡️ Respond.Block IPs, revoke tokens, reset creds. #DFIR #ThreatHunting.
@threatinsight
Threat Insight
2 months
Researchers at @Proofpoint expose threat actors’ attempt to hijack thousands of EntraID user accounts across almost 100 cloud tenants by leveraging TeamFiltration, a red teaming framework used by network defenders.
0
1
3
@cybershtuff
Curtis
2 months
Great writeup from Sekoia! @InvictusIR agrees: AiTM drives initial & credential access, fueling BEC 👉 🔎For IR, check Entra ID Sign-In, Identity Protection, & Unified Audit Logs. 🛡️Harden with passkeys & MFA for identity security. #DFIR #cloudsecurity.
@sekoia_io
Sekoia.io
2 months
📝 Our latest #TDR report delivers an in-depth analysis of Adversary-in-the-Middle (#AitM) #phishing threats - targeting Microsoft 365 and Google accounts - and their ecosystem. This report shares actionable intelligence to help analysts detect and investigate AitM phishing.
Tweet media one
0
2
9
@cybershtuff
Curtis
2 months
PowerLess backdoor's functionality includes:. Get file or directory information.Command Execution.Screenshots.Audio Capture.Browser Information Discovery.Input Capture: Keylogging.Download Files.Upload Files.Update Configurations.
0
1
2
@cybershtuff
Curtis
2 months
#CharmingKitten #APT42 #TA453 analysis & pivots. C2:.Telegram Bot used for error messages and auto-start messaging to the operator.computerlearning.ddns./net. Pivots:.bookstoragestore./com.lastfilterfile/.info.78.159.117./177.78.159.117./175.185.132.176./241.154.44.186./106.
@Unit42_Intel
Unit 42
2 months
Iranian threat group #AgentSerpens (#CharmingKitten) was observed likely using generative AI in a malicious PDF masquerading as a document from U.S. non-profit research organization, RAND. The PDF is deployed alongside Agent Serpens’ “PowerLess” malware.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
1
14
@cybershtuff
Curtis
3 months
RT @InvictusIR: Allright let's do this, a thread on Laundry Bear aka Void Blizzard. This group compromised the Dutch National Police. Let's….
0
26
0
@cybershtuff
Curtis
3 months
Cool to see this reporting and supports my previous assessment.
@ddimolfetta
David DiMolfetta
3 months
SCOOP: Commvault was accessed by Silk Typhoon, the same Chinese cyberespionage group that infiltrated the Treasury Department late last year, I’m told.⬇️.
0
0
1
@cybershtuff
Curtis
3 months
108.69.148[.]100 .128.92.80[.]210.184.153.42[.]129.108.6.189[.]53.154.223.17[.]243.159.242.42[.]20.
0
0
0
@cybershtuff
Curtis
3 months
Low confidence that this is likely a China-nexus threat actor. However, it's highly likely that the threat actor blended consumer (Linksys), industrial (Niagara 4), enterprise (Check Point Spark) assets to form covert infrastructure for staging and anonymizing their operations.
@CISACyber
CISA Cyber
3 months
Commvault is monitoring cyber threat activity targeting its apps hosted in Microsoft Azure. Threat actors may have accessed application secrets, potentially impacting customers' M365 environments. Review our recommended mitigations here 👉 📷
Tweet media one
1
0
0
@cybershtuff
Curtis
3 months
This isn’t recycled noise. It surfaces the often-overlooked details responders and CTI analysts actually need. Practical takeaways include:.✔️ Mapped TTPs.✔️ IR checklist.✔️ Actor context & relevancy. #CTI #CloudSecurity #AWS #DFIR #JavaGhost
Tweet media one
@InvictusIR
Invictus Incident Response
3 months
We've started a new series on Cloud focused threat actors, today Part I on #JavaGhost. Check it out, if you want to learn how they operate, who they target and how you can defend against them. #stayInvictus #CloudIncidentResponse #JavaGhost.
0
0
3
@cybershtuff
Curtis
3 months
Call-back Proxy Network: 103.131.213[.]89 | 182.185.156[.]45 – likely a mix of anonymous activity and normal activity. Mass SMTP Tester: 134.199.148[.]132 – banner previously responded with Mass SMTP Tester header.
0
1
1
@cybershtuff
Curtis
3 months
🚨 New blog from @datadoghq on fresh AWS TTPs! Me and Team @InvictusIR pivoted & enriched their infra data to uncover the actor #JavaGhost is likely abusing callback proxy networks and leveraging Mass SMTP Tester. 🔗 #CloudSecurity #ThreatIntel #CTI.
Tweet card summary image
securitylabs.datadoghq.com
A cloud attack targeting Amazon SES and persistence via AWS Lambda, AWS IAM Identity Center and AWS IAM
1
4
17
@cybershtuff
Curtis
5 months
🚨 New blog: BlackBasta’s leaks show how ransomware crews still exploit hybrid environments while Scattered Spider leans fully into cloud. Two actors, two strategies. What it means for IR, cloud defense, and ransomware readiness. 👉 #DFIR #Cloud #CTI.
0
0
4
@cybershtuff
Curtis
5 months
🔍 New Blog: Essential Cloud Logs for Incident Response. 🪵 Are you collecting the right logs for cloud security incidents? We break down the must-have logs to detect, investigate, and respond effectively in the cloud. 🔗 #dfir #aws #microsoft #google.
0
2
7
@cybershtuff
Curtis
6 months
🚨 New Blog: Forensic Analysis of eM Client 🚨. If you investigate BEC incidents, you've likely seen eM Client pop up. We did a forensic deep dive to uncover the traces it leaves behind. #CyberSecurity #DFIR #BEC #ThreatIntel.
@InvictusIR
Invictus Incident Response
6 months
And we are live. Enjoy the highly anticipated forensics deep dive on #eMClient.
Tweet media one
0
0
3
@cybershtuff
Curtis
6 months
We’ve mapped the TTPs and shared actionable IOCs on our GitHub. 🛡️. 👉
Tweet card summary image
github.com
Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more - invictus-ir/IOCs
@InvictusIR
Invictus Incident Response
6 months
🔍 New BEC tactic observed. Step 1: Perform Adversary in the Middle testing to get access to someone's email. Step 2: Create a Dropbox Business account using email (no verification required). Step 3: Send files via Dropbox and WeTransfer to all email contacts. Step 4: When
Tweet media one
Tweet media two
Tweet media three
0
0
3
@cybershtuff
Curtis
6 months
RT @InvictusIR: If you're wondering how you can prepare for an incident in the cloud, our new blog is for you 🫵.
0
15
0