elasticseclabs Profile Banner
Elastic Security Labs Profile
Elastic Security Labs

@elasticseclabs

Followers
4K
Following
289
Media
86
Statuses
523

Elastic Security Labs is democratizing security by sharing knowledge and capabilities necessary to prepare for threats. Spiritually serving humanity since 2019.

Global
Joined November 2022
Don't wanna be here? Send us removal request.
@DanielStepanic
Daniel Stepanic
19 hours
Really awesome new research from @k33b0i @soolidsnakee
@elasticseclabs
Elastic Security Labs
20 hours
#ElasticSecurityLabs uncovers #RONINGLOADER, a multi-stage loader utilizing signed drivers, PPL abuse, CI Policies, and other evasion techniques to deliver #DragonBreath's gh0st RAT variant. Check it out at https://t.co/Df8JLO6w4d
0
5
21
@andythevariable
Andrew Pease
19 hours
#RONINGLOADER -> PPL abuse, the new hotness.
@elasticseclabs
Elastic Security Labs
20 hours
#ElasticSecurityLabs uncovers #RONINGLOADER, a multi-stage loader utilizing signed drivers, PPL abuse, CI Policies, and other evasion techniques to deliver #DragonBreath's gh0st RAT variant. Check it out at https://t.co/Df8JLO6w4d
0
6
16
@elasticseclabs
Elastic Security Labs
20 hours
#ElasticSecurityLabs uncovers #RONINGLOADER, a multi-stage loader utilizing signed drivers, PPL abuse, CI Policies, and other evasion techniques to deliver #DragonBreath's gh0st RAT variant. Check it out at https://t.co/Df8JLO6w4d
0
28
103
@andythevariable
Andrew Pease
9 days
It's not too often we get to work shoulder-to-shoulder with the practitioners and researchers on the front lines. #REF3927 is an intrusion set that deploys SEO cloaking capabilities, RATs, webshells, and RMMs - largely using a novel IIS module we named #TOLLBOOTH
@elasticseclabs
Elastic Security Labs
25 days
#ElasticSecurityLabs joins forces with @tamusystem and discloses TOLLBOOTH, an IIS module used for SEO abuse that relies on publicly exposed ASP. NET machine keys:
0
1
4
@ValidinLLC
Validin
22 days
Fantastic work by the @harfanglab team describing and documenting indicators and detection logic for "RudePanda," described with complementary analysis by the @elasticseclabs team as "TOLLBOOTH." https://t.co/DS83PaxYi0
Tweet card summary image
harfanglab.io
Identifier: TRR251001. Summary Late August and early September 2025, our security product detected the compromises of IIS servers with a previously undocumented malicious module which we call...
@securechicken
Secure Chicken 🐣
25 days
Late summer our stuff stopped an infection chain involving a driver, a previously undocumented malicious IIS module, and ASP .NET viewstate abuse.
0
4
11
@elasticseclabs
Elastic Security Labs
23 days
#ElasticSecurityLabs releases nightMARE, a Python-based library for malware analysts that we use to build tools for acquiring intelligence. Read more about it here:
Tweet card summary image
elastic.co
This article describes nightMARE, a python-based library for malware researchers that was developed by Elastic Security Labs to help scale analysis. It describes how we use nightMARE to develop...
0
11
45
@SreekarMad
Sreekar Madabushi
25 days
@bluish_red_ @ValidinLLC Really great research from @bluish_red_ and the team at @elasticseclabs! Worth a read and if you're running IIS, should definitely check if you're impacted.
0
1
4
@Cthulhu_Sec
Braxton Williams
25 days
Amazing experience to work the great folks @elasticseclabs on this write up to showcase some interesting activity we discovered together! Excited to keep our collaboration going to give back what we can to the security community!
@elasticseclabs
Elastic Security Labs
25 days
#ElasticSecurityLabs joins forces with @tamusystem and discloses TOLLBOOTH, an IIS module used for SEO abuse that relies on publicly exposed ASP. NET machine keys:
1
2
9
@bluish_red_
Seth
25 days
@Cthulhu_Sec @elasticseclabs Your team and the customer squashing it from the get go was great! Love talking about good folks doin' the good work!
0
2
5
@_devonkerr_
Devon Kerr
25 days
This was a cool project for a few reasons. First, some of us have been working with Texas A&M since Endgame and it’s a partnership with a ton of history! Also it is a blast for us to work with other experts to achieve successes!
@elasticseclabs
Elastic Security Labs
25 days
#ElasticSecurityLabs joins forces with @tamusystem and discloses TOLLBOOTH, an IIS module used for SEO abuse that relies on publicly exposed ASP. NET machine keys:
1
6
19
@bluish_red_
Seth
25 days
Thanks for being generous with your time and expertise on this @SreekarMad! Good stuff! @ValidinLLC
@elasticseclabs
Elastic Security Labs
25 days
#ElasticSecurityLabs joins forces with @tamusystem and discloses TOLLBOOTH, an IIS module used for SEO abuse that relies on publicly exposed ASP. NET machine keys:
2
5
12
@elasticseclabs
Elastic Security Labs
25 days
#ElasticSecurityLabs joins forces with @tamusystem and discloses TOLLBOOTH, an IIS module used for SEO abuse that relies on publicly exposed ASP. NET machine keys:
Tweet card summary image
elastic.co
REF3927 abuses publicly disclosed ASP.NET machine keys to compromise IIS servers and deploy TOLLBOOTH SEO cloaking modules globally.
0
20
43
@_devonkerr_
Devon Kerr
25 days
@M_haggis @elasticseclabs Thank y'all for reading it, Michael!
0
1
3
@M_haggis
The Haag™
25 days
@elasticseclabs Love some IIS modules on a Tuesday. Thank you all for sharing
1
1
3
@elasticseclabs
Elastic Security Labs
29 days
In September, #ElasticSecurityLabs published 78 new rules! Take a look at the overview and learn how we manage these rulesets.
0
0
5
@DefSecSentinel
DefSecSentinel
1 month
Heading to my 3rd #OBTS 🌴☀️🌊today! Best conference out there. Honored to be speaking again this year alongside so many other incredible #Apple 🍎 security researchers. It’s gonna be a blast, can’t wait to see everyone! Pumped to get to share my research into using and abusing
2
6
32
@_devonkerr_
Devon Kerr
1 month
@elasticseclabs is currently researching a new family of IIS malware impacting a large number of organizations globally. With a US university-based MDR provider, we’ve observed a novel attack chain, RMMs, a Godzilla-forked framework, and a malicious driver. Details coming soon.
1
11
59
@jamieantisocial
J⩜⃝mie Williams
1 month
i'm gonna keep on dancing at the WARMCOOKIE string_bank
@elasticseclabs
Elastic Security Labs
1 month
#ElasticSecurityLabs has kept tabs on #WARMCOOKIE, a backdoor we disclosed in June 2024 that used employment-related phishing lures to infect victims. Learn how this threat’s evolving:
2
6
35
@bluish_red_
Seth
1 month
Predictive indicator for WARMCOOKIE 🍪🍪🍪 infrastructure. @ValidinLLC @500mk500
@elasticseclabs
Elastic Security Labs
1 month
#ElasticSecurityLabs has kept tabs on #WARMCOOKIE, a backdoor we disclosed in June 2024 that used employment-related phishing lures to infect victims. Learn how this threat’s evolving:
1
6
15
@elasticseclabs
Elastic Security Labs
1 month
#ElasticSecurityLabs has kept tabs on #WARMCOOKIE, a backdoor we disclosed in June 2024 that used employment-related phishing lures to infect victims. Learn how this threat’s evolving:
Tweet card summary image
elastic.co
A year later: Elastic Security Labs re-examines the WARMCOOKIE backdoor.
0
10
44