Christopher Glyer's Avatar

Christopher Glyer

@cglyer.bsky.social

Microsoft Threat Intelligence Center - Former Incident Responder & Chief Security Architect @Mandiant

3,855 Followers  |  63 Following  |  12 Posts  |  Joined: 13.06.2023  |  1.8279

Latest posts by cglyer.bsky.social on Bluesky

Are you ready to pivot?!
Come to Malaga on May 8-10, 2024!
#PIVOTcon24 is crafted to bring together professionals from diverse backgrounds – private sector, government, law enforcement, military, academics, and investigative journalists.
#ThreatIntel #CTI

14.12.2023 14:10 β€” πŸ‘ 9    πŸ” 7    πŸ’¬ 1    πŸ“Œ 1
Post image

Sneak preview of my #cyberwarcon slides πŸ‘€

03.11.2023 00:10 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

"You compile me. You had me at RomCom" - When cybercrime met espionage"

Get ready for a #CYBERWARCON talk full of romantic comedy memes!

www.cyberwarcon.com/you-compile-...

06.10.2023 17:33 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Analysis of Storm-0558 techniques for unauthorized email access | Microsoft Security Blog Analysis of the techniques used by the threat actor tracked as Storm-0558 for obtaining unauthorized access to email data, tools, and unique infrastructure characteristics.

Here are technical details on Storm-0558

https://www.microsoft.com/en-us/security/blog/2023/07/14/analysis-of-storm-0558-techniques-for-unauthorized-email-access/

14.07.2023 17:26 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

That’s the only one I’ve seen so far

06.07.2023 21:41 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Notable Storm-0875 tradecraft (cont’d)
4. Multiple methods of persistence (RMM deployment, remote access internet facing RDP, identity provider federation, golden saml, VMs spun up in victim cloud infrastructure)
5. Generally shy away from deployment of backdoors
6. Social engineering

06.07.2023 12:58 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Notable Storm-0875 tradecraft
1. Initial Access: Sms phishing + AITM or purchase infostealer logs (bypasses most defenses)
2. Privilege escalation via SIM swapping or call number forwarding global admin’s personal phone
3. Time from initial access to global admin often occurs within hours

06.07.2023 12:56 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Post image

IMO: Storm-0875 (overlaps UNC3944/Scattered Spider) is the most dangerous financial threat actor right now

Some recent developments:
1. Now deploying ransomware (had been extorting orgs before)
2. In last few months targeting large/well known enterprises (not just telcos/help desk/crypto orgs)

06.07.2023 12:45 β€” πŸ‘ 8    πŸ” 5    πŸ’¬ 1    πŸ“Œ 2

Wouldn’t a middle ground be to require orgs to notify authorities if they pay an extortion and report the crypto wallet/address and any other pertinent identifiers (copy of ransom note, email addresses used…etc)

17.06.2023 21:16 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

β€œRansom deployment of a cl0p payload”

Thanks autocorrect

17.06.2023 21:14 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Clop/Lace Tempest operates in two modes
1) traditional enterprise compromise/priv esc (using backdoors like truebot), data exfil, and random deployment of a clip ransom payload
2) broad exploitation of file transfer software that leads to data extortion only

They stop doing #1 when focused on #2

17.06.2023 21:14 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 2    πŸ“Œ 0

if i was a FVEY CI officer, my first thought on a RU-based company publishing on FSB ops wouldn’t be β€œlook at the analytic freedom!” β€” it would be β€œwhy is the FSB comfortable with the world knowing about this now? did they figure out we were onto it in some way?”

16.06.2023 21:22 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0

I’ve been in touch w/different victims of MOVEit exploitation by Lace Tempest. One thing orgs should be prepared for is initial $ demand that is (in some cases) order of magnitude or more than a typical org would pay (relative to size of payment in other ransom/extortion cases)

15.06.2023 01:14 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Attribution update from MSTIC on MOVEit Transfer 0-day exploitation by Lace Tempest. Victims w/ data theft are likely to be extorted via the cl0p leak site in coming weeks

We’ve shared intel on dozens of exfil IP addresses used in attacks w/customers & industry partners

15.06.2023 01:13 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 1

@cglyer is following 20 prominent accounts