Kaushik's Avatar

Kaushik

@kausrini.bsky.social

Reverse Engineering | Threat Intel | DFIR | Captcha verified human with own opinions (not employer's).

33 Followers  |  244 Following  |  3 Posts  |  Joined: 14.11.2024  |  1.7405

Latest posts by kausrini.bsky.social on Bluesky

MSTIC is hiring! Current roles in US and AU.

The Microsoft Threat Intelligence Center (MSTIC) is recruiting experienced nation-state threat hunters with highly honed threat intel analysis skills. MSTIC is responsible for delivering timely threat intelligence across our product & services teams.

05.12.2024 18:22 — 👍 115    🔁 35    💬 4    📌 5

Storm-0156 is a Pakistan based group which overlaps with public reporting of SideCopy / TransparentTribe.

Its fascinating that SideCopy earned its name for copying TTPs of Sidewinder and we observe Secret Blizzard (SB) copying SideCopy's tool names (SB might as well be called as Side-SideCopy)

05.12.2024 09:14 — 👍 0    🔁 0    💬 0    📌 0
Preview
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog Microsoft has observed Secret Blizzard compromising the infrastructure and backdoors of the Pakistan-based threat actor we track as Storm-0156 for espionage against the Afghanistan government and Indi...

In this first of a two-part blog series, Microsoft Threat Intelligence discusses how Secret Blizzard is utilizing the infrastructure of Storm-0156 to conduct their own espionage operations.

www.microsoft.com/en-us/securi...

05.12.2024 09:12 — 👍 0    🔁 0    💬 1    📌 0

Hello World!!!

29.11.2024 12:24 — 👍 2    🔁 0    💬 0    📌 0
Preview
Between Two Gregs: An Update on the North Korean Threat Landscape In this episode of the Microsoft Threat Intelligence Podcast host Sherrod DeGrippo is joined by Proofpoint’s Greg Lesnewich and Microsoft’s Greg Schloemer to share the unique threat posed by North Korea’s (DPRK) state-sponsored cyber activities. The Gregs discuss their years of experience tracking North Korean cyber actors and the distinct tactics that set DPRK apart from other nation-sponsored threats. The conversation also explores North Korea’s high stakes, as DPRK threat actors operate under intense pressure from government handlers, adding a layer of urgency and fear to their operations. They share insights into North Korea’s aggressive use of stolen cryptocurrency to fund the regime’s initiatives, like ballistic missile tests, and discuss the broader geopolitical impact.

My two favorite Gregs talking my favorite topic. Check it out!

thecyberwire.com/podcasts/mic...

21.11.2024 15:00 — 👍 3    🔁 2    💬 0    📌 0

@kausrini is following 20 prominent accounts