My Authors
Read all threads
🔥 "Hacking Tracking Pix & Macro Stomping Tricks"
📺 pscp.tv/FireEye/1djGXQ…

On this 🆕 #StateOfTheHack, @cglyer👨🏼‍🦲 & I break down trendy tradecraft.

Special guests:
👨🏻 Macro stomping (@a_tweeter_user)
👨🏻‍🦱 CVE exploitation in the trenches (@_bromiley)

👇🏼Episode Recap Thread! 🧵
We start with tracking pixels: ◻️ <spacer.gif>
We break down how marketing tools are used by attackers looking to learn more about their planned victim's behavior and system - prior to sending any first stage malware.
For some background, see this thread:
On the show, we chatted through what we've seen as defenders but also some cool victim behavior profiling methods from our offensive security friends, like those shared by @malcomvetter 🎇:

Ok, so why learn specific Office version used? ...
In addition to knowing where they are and whether they'd click, if you know your potential victim's Office version, you can deliver:
1⃣version-specific exploits (e.g., #RULER home page) or
2⃣version-specific payload evasions

👉🏼 (around 8 minutes in)
Example evasion affecting static & dynamic analysis: VBA macro stomping 📄🦶🏼 *

For this, @a_tweeter_user stepped in to break down the method & new blog fireeye.com/blog/threat-re… about #UNC1870's use of p-Code compilation & PROJECT stream manipulation (& rap)

*Credit @JohnLaTwC...
...Credit: @JohnLaTwC for both the emoji representation of VBA macro stomping, but also his fantastic 🆕🔥 thread on examples & methods to find it:
@JohnLaTwC Next - a second guest ‼️
pscp.tv/FireEye/1djGXQ… [~20 minutes in]
Matt Bromiley (@_bromiley) drops by to talk through industry efforts to respond to the critical Citrix vulnerability, CVE-2019-19781, some UNC groups abusing it, and "squatter's rights" [for exploits-as-a-service?]
@JohnLaTwC @_bromiley We covered our 3 technical blogs detailing exploit evasions and several distinct, uncategorized clusters of activity using the Citrix vulnerability for coin-mining (sic semper coinminus, btw), #NOTROBIN, and real 👀 attempted #ETERNALBLUE-laced ransomware.
fireeye.com/blog/threat-re…
@JohnLaTwC @_bromiley .@cglyer & @_bromiley also talked about some of the follow-up activity they've seen from the UNC group that deployed #NOTROBIN

If you haven't, def read @williballenthin & @MadeleyJosh's blog – or at least the /r/netsec complaints about their blog title 🙃
reddit.com/r/netsec/comme…
@JohnLaTwC @_bromiley @cglyer @williballenthin @MadeleyJosh That's it for this #StateOfTheHack recap.
pscp.tv/FireEye/1djGXQ…
🙏🏽Thanks again to guests @a_tweeter_user & @_bromiley as well as the industry collaboration on VBA stomping & Citrix ADC CVE response 💪

Until I get one on @FireEye's official blog, @threadreaderapp unroll this 🧵
The audio-only episode is now available for your morning commute. Detailed show notes match this thread: feye.io/soh
Missing some Tweet in this thread? You can try to force a refresh.

Enjoying this thread?

Keep Current with Nick Carr

Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!