Corporate InfoSec is vastly more complicated than locking a car door, and is not a core business function for most companies. They’ll never get pro-active about security to any meaningful level. Maybe they shouldn’t have to.
I'm getting extremely fed up with the victim-blaming in InfoSec. Nobody has a security budget that exceeds their attack surface, and few companies have sufficient staffing. So who's "fault" is that breach exactly?
It's not always possible to scan every device in your network for crypt mining malware (Linux boxes, IOT, App containers)
But you could check your DNS & firewall logs for connections to the limited number of mining pools
I've compiled a list for you
nextron-systems.com/2021/10/…
Upgrade to a new iPhone for "free" with trade-in... as long as you agree to the 36-month installment plan during which your phone is carrier locked (inluding the eSIM). I'm calling BS on you @ATT.
1\ Threat actors leave behind traces on disks that end up incriminating them or giving away that they are Russian/Ukranian.
If you ever see RDP events, you should parse out the RDP bitmap cache. It maps out bitmap images of a user's RDP session.
#DFIR
I found some private keys on VT, enabling all of us to decrypt C2 traffic from a subset of all the malicious Cobalt Strike servers that are out there on the Internet. More details: "Cobalt Strike: Using Known Private Keys To Decrypt Traffic – Part 1" blog.nviso.eu/2021/10/21/cob…