www.inversecos.com
Open in
urlscan Pro
142.250.186.115
Public Scan
Submitted URL: http://www.inversecos.com/
Effective URL: https://www.inversecos.com/
Submission: On September 17 via manual from SE — Scanned from DE
Effective URL: https://www.inversecos.com/
Submission: On September 17 via manual from SE — Scanned from DE
Form analysis
1 forms found in the DOMhttps://www.inversecos.com/search
<form action="https://www.inversecos.com/search" target="_top">
<div class="search-input">
<input aria-label="Search this blog" autocomplete="off" name="q" placeholder="Search this blog" value="">
</div>
<input class="search-action flat-button" type="submit" value="Search">
</form>
Text Content
Skip to main content INVERSECOS POSTS OFFICE365 ATTACKS: BYPASSING MFA, ACHIEVING PERSISTENCE AND MORE * Get link * Facebook * Twitter * Pinterest * Email * Other Apps September 16, 2021 APTs are actively attacking Office 365 (O365) – finding mechanisms to bypass MFA and to impersonate users regardless of whether you reset their passwords. When I was looking through the Mitre mapping of O365 attacks , I noticed that it didn’t include many methods of intrusion and actions on objectives that can occur with O365. In conversations with several clients, I couldn’t help but notice that there’s still a heavy focus on “endpoint” style attacks and not much resource / thought put into attacks that can occur in the cloud. Attacking O365 gives an attacker many benefits… it allows an attacker to impersonate users, alter MFA settings, register malicious devices, access Teams messages, download sensitive emails, access SharePoint, OneDrive, register malicious applications and various other actions that could allow them to maintain persistence in your environment. This blog post explores the various ways O365 can be attacked. I will be writing a Part II follow up that describes the me Post a Comment Read more BACKDOOR OFFICE 365 AND ACTIVE DIRECTORY - GOLDEN SAML * Get link * Facebook * Twitter * Pinterest * Email * Other Apps September 02, 2021 Backdoors can bypass all MFA requirements put in place by an organisation. Earlier this year, I worked an engagement with an APT group that had a keen interest on the client’s Office 365 environment, where this group found a way to bypass authentication controls to access the environment. Given that most clients either have a hybrid authentication model set-up or are fully in the cloud – I think it’s important that most blue teams / defenders / hunters are aware of the various techniques threat actors are using against Azure AD. Compromise of the AD FS server token-signing certificate could result in access to the Azure/Office365 environment by the attacker. By default, this certificate is valid for a year and will allow an attacker to log into Azure/Office365 as any user within AD regardless of any password resets and MFA. The implication of this, is that the attacker maintains persistence and has a means to re-enter into the environment, escaping detection. This blog post will cover 2 comments Read more HOW TO BUILD A CRYPTO TOKEN IN UNDER 10 MINUTES (ECR-20) * Get link * Facebook * Twitter * Pinterest * Email * Other Apps May 15, 2021 With the rise of Doge and other Ethereum based tokens (NFTs, $UNI, $LINK....) I figure there would be many people wanting to learn how to use Solidity to build their own meme (or non-meme) tokens. This blog post will show you step-by-step how to do this within 10 minutes. If you find this content helpful, please feel free to send me some DOGE @ DRwU8cc4F5MsC9egz2yKfqCFUQr5VpMQ51. What is a token? Crypto "coins" like Bitcoin (BTC) are generally used as "money" or a unit of value and are stored on the coin-specific blockchain. Tokens are built on these existing blockchains (on top of the Ethereum/Neo/etc blockchain). This blog post will be showing you how to build an Ethereum-based token (ECR-20). Tokens are most commonly used with a dApp (decentralised application). For example, with Enjin , you can use your tokens to purchase in-game assets on the virtual marketplace. These can be characters, plots of land or assets like trees or other digital assets. NFTs are us 1 comment Read more FORENSIC ANALYSIS OF ANYDESK LOGS * Get link * Facebook * Twitter * Pinterest * Email * Other Apps February 10, 2021 Most threat actors during ransomware incidents utilise some type of remote access tools - one of them being AnyDesk. This is a free remote access tool that threat actors download onto hosts to access them easily and also for bidirectional file transfer. There are two locations for where AnyDesk logs are stored on the Windows file system: %programdata%\AnyDesk\ad_svc.trace %appdata%\Anydesk\ad.trace The AnyDesk logs can be found under the appdata located within each users' directory where the tool has been installed. Forensic analysis of these logs reveal interesting pieces of information inside the "ad.trace" log: Remote IP where the actor connected from File transfer activity Locating the Remote IP Connecting to AnyDesk Inside the "ad.trace" log you can grep for the following term "External address" and this should reveal the following line pasted below. I have redacted the IP for privacy's sake: info 2021-02-04 23:25:10.500 lsvc 9988 2 comments Read more SUCCESSFUL 4624 ANONYMOUS LOGONS TO WINDOWS SERVER FROM EXTERNAL IPS? * Get link * Facebook * Twitter * Pinterest * Email * Other Apps April 30, 2020 If you see successful 4624 event logs that look a little something like this in your Event Viewer showing an ANONYMOUS LOGON, an external IP (usually from Russia, Asia, USA, Ukraine) with an authentication package of NTLM, NTLMSSP, don't be alarmed - this is not an indication of a successful logon+access of your system even though it's logged as a 4624. If your server has RDP or SMB open publicly to the internet you may see a suite of these logs on your server's event viewer. Although these are showing up as Event ID 4624 (which generally correlates to successful logon events), these are NOT successful access to the system without a correlating Event ID 4624 showing up with an Account Name \\domain\username and a type 10 logon code for RDP or a type 3 for SMB. You can double check this by looking at 4625 events for a failure, within a similar time range to the logon event for confirmation. The reason for this is because when a user initiates an RDP or SMB c 10 comments Read more NEW PYROGENIC JAR-BASED MALWARE CAMPAIGN - INDICATORS OF COMPROMISE * Get link * Facebook * Twitter * Pinterest * Email * Other Apps November 08, 2019 A new JAR-based phishing campaign has been seen delivered to Australian companies with the intent of credential stealing Office 365 account passwords as well as passwords stored in the browser. This campaign appears to have first occurred late September 2019 - November 2019. Initial Infection This campaign is delivered via a phishing email to corporate account users with an image of a PDF file which contains an embedded hyperlink If a user clicks on the image of the PDF they are taken to the first C2 domain - in this instance it was to https://caygionghocviennongnghiep1.com/FRA.html which resulted in a download of the malicious JAR file 'BankPaymAdviceVend_LLCRep.jar' to the downloads folder: User interaction is then required in order to execute the malware. Once execution occurs, the following process chain occurs where javaw.exe is spawned. The javaw.exe process is stopped in memory and two DLLs are dropped into the AppData/Local/TEMP folder, loaded and then de Post a Comment Read more MALWARE ANALYSIS: SLINGSHOT APT EXPOSED FROM 6 YEARS OF HIDING * Get link * Facebook * Twitter * Pinterest * Email * Other Apps March 13, 2018 Designed for cyber espionage, Slingshot APT (Advanced Persistent Threat) has hidden from researchers for over 6 years and has infected at least 100 hosts worldwide in the Middle East and Africa. The malware used exploits on Mikrotik routers and has been listed as one of the most sophisticated attacks discovered rivalling Project Sauron (nation-state funded malware) and Regin (the malware that infiltrated Proximus Group ). Due to the sophisticated nature of Slingshot APT, Kaspersky Labs report suspects the malware has received significant resource and financial backing and was the result of a highly-targeted attack plan. Slingshot APT is able to log user data, collect open windows, keystrokes and network data among other functionalities. Slingshot APT works by replacing a legitimate Windows DLL ( scesrv.dll or spoolsv.exe ) related to Virtual File System, with a malicious one. There are two embedded loaders in Slingshot in the case of the first loader failing, the second loade 3 comments Read more More posts Powered by Blogger REPORT ABUSE MY BOOK * How to get a job in cybersecurity earning over six figures : Zero to Cyber Hero inversecos Visit profile LINA LAU Principal IR Consultant @ Secureworks formerly ANZ IR Lead @ Accenture. Blogging about APTs, TTPs and all things tech SOCIAL * Twitter * LinkedIn SEARCH BLOG ARCHIVE * September 20212 * May 20211 * February 20211 * April 20201 * November 20191 * March 20181 * December 20171 * October 20172 * June 20172 Diese Website verwendet Cookies von Google, um Dienste anzubieten und Zugriffe zu analysieren. Deine IP-Adresse und dein User-Agent werden zusammen mit Messwerten zur Leistung und Sicherheit für Google freigegeben. So können Nutzungsstatistiken generiert, Missbrauchsfälle erkannt und behoben und die Qualität des Dienstes gewährleistet werden.Weitere InformationenOk