APT folks... is UNC3886 becoming a top-tier actor?
www.trendmicro.com/en_us/resear...
www.sygnia.co/blog/fire-an...
supportportal.juniper.net/s/article/20...
cloud.google.com/blog/topics/...
@austinlarsen.me.bsky.social
Principal Threat Analyst - Google Threat Intelligence Group
APT folks... is UNC3886 becoming a top-tier actor?
www.trendmicro.com/en_us/resear...
www.sygnia.co/blog/fire-an...
supportportal.juniper.net/s/article/20...
cloud.google.com/blog/topics/...
This campaign deploys malware like STARKVEIL, XWORM & FROSTRIFT. Our report covers their TTPs including the use of Unicode Braille patterns to obfuscate executable file names and their continuous rotation of domains to evade detection.
cloud.google.com/blog/topics/...
New @mandiant.com research: UNC6032 (Vietnam-nexus actor π»π³) is exploiting interest in AI tools, using fake AI video generator sites & malicious ads to spread malware.
The campaign, active since mid-2024, aims to steal credentials, cookies & financial data.
π¨ Heads up! π¨ APT41 is using Google Calendar ποΈ as their latest C2 trick. GTIG just pulled back the curtain π on the TOUGHPROGRESS malware campaign and how we shut it down πͺ. Dive into the details here: πhttps://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics
28.05.2025 14:11 β π 8 π 4 π¬ 1 π 3Googleβs M-Trends 2025 report is out - data from Mandiantβs incident response engagements. Direct PDF link to avoid the sales pitch wall:
https://services.google.com/fh/files/misc/m-trends-2025-en.pdf
Thread about my main observations:
- Firstly, no mention of generative AI or GenAI again [β¦]
Confirming that CISA has stopped using VirusTotal and Censys.
"Makes their jobs a lot harder," a person familiar with the matter told me, adding, "There's a possibility that more services might be limited or cut due to budget."
Excellent breakdown of the βRogue RDPβ TTP weβve seen susp Russian APT UNC5837 using in their campaigns written by my colleague Rohit (@IzySec over on X)
07.04.2025 15:06 β π 16 π 8 π¬ 0 π 0In 25 years of covering national security, Iβve never seen a story like this: Senior Trump officials discussed planning for the U.S. attack on Yemen in a Signal group--and inadvertently added the editor-in-chief of The Atlantic. www.theatlantic.com/politics/arc...
24.03.2025 16:11 β π 16823 π 6584 π¬ 800 π 2642π¨ Following a months-long investigation stemming back to mid-2024, Mandiant just published details on a campaign by China-nexus actor UNC3886 targeting Juniper routers. Our investigation uncovered a custom malware ecosystem on end-of-life Juniper MX devices.
cloud.google.com/blog/topics/...
Hundreds protested at the national labs today in Boulder, Colorado. #SaveOurServices #resist #NOAA #NIST #NCAR #ScienceSavesLives
03.03.2025 20:34 β π 843 π 214 π¬ 12 π 17Today was a grim, terrible day for the United States and the cause of democracy. Putin, along with other dictators around the world, can finally look at Trump with confidence and think: one of us.
www.theatlantic.com/ideas/archiv...
A 21-year-old U.S. Army soldier linked to last year's Snowflake attack spree allegedly tried to sell stolen data to a foreign intelligence service after searching for information about how to defect to Russia. Hat tip to @nixonnixoff.bsky.social @austinlarsen.me cyberscoop.com/army-soldier...
27.02.2025 23:03 β π 28 π 12 π¬ 2 π 1The no-opsec Army guy who was part of the group that leaked Trump's call logs (and worse, threatened me) google searched how to defect to Russia and "can hacking be treason" ππππ
He was never going to get away.
For the US to side with Russia and North Korea to oppose a UN resolution condemning the illegal invasion of Ukraine defies all common sense and adds insult to the countless injuries suffered by the brave Ukrainian people. edition.cnn.com/2025/02/24/p...
25.02.2025 09:29 β π 63151 π 14327 π¬ 3683 π 1372Today, Google Threat Intelligence is alerting the community to increasing efforts from several Russia state-aligned threat actors (GRU, FSB, etc.) to compromise Signal Messenger accounts.
cloud.google.com/blog/topics/...
DHS has terminated the memberships of everyone on its advisory committees.
This includes several cyber committees, like CISA's advisory panel and the Cyber Safety Review Board, which was investigating Salt Typhoon.
That review is "dead," person familiar says.
www.documentcloud.org/documents/25...
A bug in Cloudflare (and just the nature of how CDNs work) let an attacker learn the broad location of Discord, Signal, Twitter users by just sending them an image, according to a security researcher. It works because check which data center cached the image www.404media.co/cloudflare-i...
21.01.2025 14:40 β π 2450 π 666 π¬ 101 π 39"FBI leaders have warned that they believe hackers who broke into AT&T Inc.βs system last year stole months of their agentsβ call and text logs, setting off a race within the bureau to protect the identities of confidential informants."
www.bloomberg.com/news/article...
π₯ new blog detailing 0day exploitation of Ivanti appliances as well as some newly observed malware families tracked as PHASEJAM and DRYHOOK. We also detail activity related to the previously observed SPAWN* malware ecosystem tied to China-nexus cluster UNC5337.
cloud.google.com/blog/topics/...
Patch immediately, run the Ivanti external ICT checker, read our latest research for a detailed breakdown of the threat, and checkout Ivanti's advisory for the latest guidance:
forums.ivanti.com/s/article/Se...
π‘οΈ Persistence: Threat actors are installing persistent backdoors on compromised appliances that can survive across system reboots and upgrades. Mandiant identified the actors using backdoors including SPAWN, SPAWNANT, SPAWNMOLE, SPAWNSNAIL, SPAWNSLOTH, DRYHOOK, and PHASEJAM.
09.01.2025 00:42 β π 0 π 0 π¬ 1 π 0π‘οΈ ICT Evasion: Threat actors are manipulating the Ivanti Integrity Checker Tool (ICT) manifest to include their own malicious files, effectively bypassing this detection mechanism.
09.01.2025 00:42 β π 0 π 0 π¬ 1 π 0π‘οΈ Fake Upgrade: Threat actors are deploying PHASEJAM malware to block legitimate system upgrades while simultaneously displaying a fake upgrade progress bar. This creates a convincing facade of a successful update, when in reality, the malware silently prevents the actual upgrade from taking place.
09.01.2025 00:42 β π 0 π 0 π¬ 1 π 0This threat showcases how China-nexus cyber espionage actors continue to evolve, becoming more agile, stealthy, and difficult for defenders to detect. They employed several interesting techniques to maintain access to compromised Ivanti appliances and evade defenders. Here's what you need to know:
09.01.2025 00:42 β π 0 π 0 π¬ 1 π 0π¨ New: Zero-day vulnerability #CVE-2025-0282 in Ivanti Connect Secure VPN is being actively exploited, including by suspected China-nexus cyber espionage groups. Our team at Mandiant in partnership with Ivanti just published our initial findings. π§΅
cloud.google.com/blog/topics/...
Probably the most comprehensive narrative to date about the Volt and Salt Typhoon campaigns.
05.01.2025 19:49 β π 50 π 12 π¬ 3 π 1>IQ levels when you are a cybercriminal that tries to extort the president, but you are government property and Krebs is calling your mom :(
31.12.2024 04:06 β π 80 π 14 π¬ 1 π 2Something completely underappreciated in how Google Chrome revolutionized the web and security and software in general β was the silent background auto-update + and non-admin user-level installs. It set a bar that changed everything on ability to make progress & address threats. Broke IT paradigms.
20.12.2024 03:39 β π 732 π 71 π¬ 16 π 5Who wants to be next?
(Waifu arrest footage released by WSJ)
www.wsj.com/tech/cyberse...