Kaushik's Avatar

Kaushik

@kausrini.bsky.social

Reverse Engineering | Threat Intel | DFIR | Captcha verified human with own opinions (not employer's).

32 Followers  |  244 Following  |  3 Posts  |  Joined: 14.11.2024  |  1.5469

Latest posts by kausrini.bsky.social on Bluesky

MSTIC is hiring! Current roles in US and AU.

The Microsoft Threat Intelligence Center (MSTIC) is recruiting experienced nation-state threat hunters with highly honed threat intel analysis skills. MSTIC is responsible for delivering timely threat intelligence across our product & services teams.

05.12.2024 18:22 โ€” ๐Ÿ‘ 115    ๐Ÿ” 35    ๐Ÿ’ฌ 4    ๐Ÿ“Œ 5

Storm-0156 is a Pakistan based group which overlaps with public reporting of SideCopy / TransparentTribe.

Its fascinating that SideCopy earned its name for copying TTPs of Sidewinder and we observe Secret Blizzard (SB) copying SideCopy's tool names (SB might as well be called as Side-SideCopy)

05.12.2024 09:14 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog Microsoft has observed Secret Blizzard compromising the infrastructure and backdoors of the Pakistan-based threat actor we track as Storm-0156 for espionage against the Afghanistan government and Indi...

In this first of a two-part blog series, Microsoft Threat Intelligence discusses how Secret Blizzard is utilizing the infrastructure of Storm-0156 to conduct their own espionage operations.

www.microsoft.com/en-us/securi...

05.12.2024 09:12 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Hello World!!!

29.11.2024 12:24 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Between Two Gregs: An Update on the North Korean Threat Landscape In this episode of the Microsoft Threat Intelligence Podcast host Sherrod DeGrippo is joined by Proofpointโ€™s Greg Lesnewich and Microsoftโ€™s Greg Schloemer to share the unique threat posed by North Koreaโ€™s (DPRK) state-sponsored cyber activities. The Gregs discuss their years of experience tracking North Korean cyber actors and the distinct tactics that set DPRK apart from other nation-sponsored threats. The conversation also explores North Koreaโ€™s high stakes, as DPRK threat actors operate under intense pressure from government handlers, adding a layer of urgency and fear to their operations. They share insights into North Koreaโ€™s aggressive use of stolen cryptocurrency to fund the regimeโ€™s initiatives, like ballistic missile tests, and discuss the broader geopolitical impact.

My two favorite Gregs talking my favorite topic. Check it out!

thecyberwire.com/podcasts/mic...

21.11.2024 15:00 โ€” ๐Ÿ‘ 3    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@kausrini is following 20 prominent accounts