GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Embed Notice

HTML Code

Corresponding Notice

  1. Embed this notice
    Brian Clark (deepthoughts10@infosec.exchange)'s status on Wednesday, 22-Jan-2025 04:39:57 JSTBrian ClarkBrian Clark
    • screaminggoat

    This tactic of sending unsolicited messages and calls via Teams has an easy solution—only allow specific external domains to communicate with your end users. Review your Teams logs, see which domains your users are communicating with, add them to the allow list and enable the control. Make your end users open up a support ticket for future domain adds so you can vet them.

    Forget about Zero Trust and apply best practice security configurations. Let the marketing people and the CISO worry about whether something is “zero trust” or not. #Cybersecurity

    Microsoft docs:
    https://learn.microsoft.com/en-us/microsoft-365/solutions/trusted-vendor-onboarding?view=o365-worldwide#allow-the-vendors-domain-in-teams-external-access

    From: @screaminggoat
    https://infosec.exchange/@screaminggoat/113867636525001029

    In conversationabout a year ago from infosec.exchangepermalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: learn.microsoft.com
      Onboard trusted vendors to collaborate in Microsoft 365
      from DaniEASmith
      Learn how to onboard trusted vendors to collaborate in Microsoft 365.
    2. No result found on File_thumbnail lookup.
      Not a Goat 🦝 (@screaminggoat@infosec.exchange)
      from Not a Goat 🦝
      I copied [the tweets](https://twitter.com/MsftSecIntel/status/1881751618695094432) from **Microsoft Threat Intelligence** at the Bad Place™ so you don't have to: 1. In the last quarter of 2024, Microsoft Threat Intelligence observed developments in the ransomware ecosystem that researchers and defenders should watch for in 2025. 2. Exploitation of vulnerabilities remains a key method for initial access. In October, the threat actor Lace Tempest, known for exploiting 0-days in file-transfer software, was observed exploiting vulnerabilities in Cleo products (CVE-2024-50623, CVE-2024-55956). 3. This exploitation activity increased in December and, as in past campaigns, Lace Tempest performed double extortion via the Clop leak site. Among ransomware leak sites, however, RansomHub saw the most activity. 4. RansomHub, a RaaS offering that first appeared in February 2024, was quickly adopted by many threat actors, following the disruption of the hugely popular LockBit. In December, however, LockBit operators announced a new version of the ransomware called LockBit 4. 5. Microsoft analysts noted that among improvements in detection evasion, anti-analysis, and encryption, LockBit 4 has a function for a “quiet mode.” While Microsoft has not observed widespread use of LockBit 4, analysts and defenders should take note and monitor. 6. The quiet mode in LockBit 4 can allow threat actors to launch attacks in which file extensions and modification times are preserved after encryption, and ransom notes are not dropped, presenting detection and investigation challenges. 7. Social engineering also continues to be a prevalent initial access method. In this period, threat actors like Storm-1674 and Storm-1811 continued to conduct phishing and voice phishing (vishing) campaigns over Microsoft Teams. 8. In these campaigns, the threat actors impersonate IT and help desk personnel, then misuse Quick Assist and other tools to install remote access trojans (RATs). 9. Storm-1674 is an access broker known for distributing DarkGate, SectopRAT, & Zloader and handing off access to threat actors like Storm-0506 & Sangria Tempest. Storm-1811 is known for social engineering leading to the deployment of BlackBasta using Qakbot and other malware. 10. In late October to early November, Storm-1811 was observed conducting email bombing before posing as help desk personnel offering to help with the email problem. In this new campaign, Storm-1811 was observed deploying a new malware loader called ReedBed. 11. Microsoft Defender data shows that the most widespread ransomware variants in the last quarter of 2024 were Akira, FOG, Qilin, Lynx, and the aforementioned RansomHub and BlackBasta. This period also saw the new ransomware variants SafePay and Hellcat. 12. While the ransomware ecosystem is always evolving, applying durable best practices like credential hygiene, the principle of least privilege, and Zero Trust will continue to help users and organizations protect environments from ransomware threats. https://safe.menlosecurity.com/https://learn.microsoft.com/en-us/security/ransomware/ #threatintel #infosec #cybercrime #ransomware #cybersecurity #storm1674 #storm1811 #clop #lockbit #CVE_2024_50623 #CVE_2024_55956 #cyberthreatintelligence #cti #storm0506 #SangriaTempest #ReedBed #Qakbot #BlackBasta #Zloader #darkgate #qilin #akira #ransomhub
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.