Here's the truth:
♥️ Joining Mandiant was the best decision of my career – the people & company have been SO good to me
🧠 Many of the brilliant minds in security are here & we have FUN every day
1/8
💻🔍 There is no better professional #infosec experience than responding to the intrusions that matter & defending at-scale alongside awesome people. If you have the chance to work here – .
🗓️ One year here is worth many more in experience. So here are some highlights:
2/8
☕️ Doing LRs & writing decoders during my first Mandiant breach response - with #APT17's HIKIT & also BLACKCOFFEE malware using technet for C2: fireeye.com/blog/threat-re…
💰 I was fortunate to lead the first IR for the group that would come to be known as #FIN7
3/8
If you work hard, sometimes you can outpace attackers & expose them to educate others. Here are a few IRs I did that we were allowed to share publicly:
🇷🇺 #APT29 🤯 #NoEasyBreach
... and so many more that are NDA'ed forever, but I'll never forget! 🤫 5/8
A few years ago, I jumped at the chance to build out the #AdvancedPractices 🦅 front-line research team [follow many of them @ twitter.com/i/lists/104134…] and work alongside to FLARE's reverse engineers 🧙🏽♂️. The teams are brimming with talent, hard-work, & creative solutions.
6/8
I'm pleased to have helped shape authentic (& spicy) comms.
It's been an honor to have front-line friends from all across the company on #StateOfTheHack for the past ~2 years:
On the show & in our blogs, we now go behind-the-scenes and show our work.
7/8
The goodbyes have been brutal. I'll miss the people immensely. But like, let's be honest, we are all still going to hang out on this free website Twitter dot com.
I'm super excited for what's next – and I hope the bad guys like their hiding spots because here I come! ➡️☁️😉
8/8
I'm going to take a few weeks "off" to spend time with my wife, COVID-19-homeschool my kids, pace anxiously around my home quarantine, get in better shape, & try to learn piano. By the end of the month, you can find me here:
The value of our (+@cglyer) real-time attacker technique collaboration with absolute beasts in the industry @doughsec 😶🌫️, @penninajx + @srunnels 💻 cannot be overstated bringing together puzzle pieces for the RE wizards on each side
From the new @WIRED article: wired.com/story/the-unto…
———
While Mandia conferred with the government, Charles Carmakal, the CTO of Mandiant Consulting, contacted some old friends. Many of the hackers’ tactics were unfamiliar, and he wanted to see whether two former Mandiant… twitter.com/i/web/status/1…
We've been tracking DEV-0537 since 2021 (overlaps: Lapsus$, UNC3661). Here's a comprehensive 🆕 BLOG 📰 covering observed TTPs: microsoft.com/security/blog/…
#MSTIC and Defender threat intel collab
➕#DART 👻 incident response team experience from the trenches [1/3]
The blog highlights varied initial access vectors and a slew of [inconsistent?] end goals: data theft, extortion, chaos...
One way to interpret "this actor's TTPs and infrastructure are constantly changing" is that they are loosely-organized (see:
DEV-0537 / Lapsus$ shows that 𝘢𝘵𝘵𝘢𝘤𝘬𝘦𝘳𝘴 can be creative opportunists and still be successful.
Luckily, the same goes for 𝘥𝘦𝘧𝘦𝘯𝘥𝘦𝘳𝘴.
Use this opportunity to strengthen your security controls to protect far beyond this threat actor [3/3] microsoft.com/security/blog/…
But then what?? Let’s talk about some post-compromise techniques...
Please read the above blog to appreciate multiple backdoors used, careful & unique tradecraft used on-premise...
We just published more details on what we’ve been finding post-compromise: blogs.microsoft.com/on-the-issues/…
ADFS key material compromise, SAML shenanigans, OAuth keys added...
Yes - it's hardcoded for netblocks released in the #MSTIC report (microsoft.com/security/blog/…)
This is just extra coverage on top of existing cred harvesting logic
That said, the logic posted there finds some high fidelity #STRONTIUM campaigns from at least June through... recently (more details in above blog).
You'll see a User-Agent, first/last attempt, # of total attempts, # of unique IPs & unique accounts attempted + a list of accounts
As shipped, it's looking over the past 30 days. But if you have #AzureSentinel, I recommend pasting that same KQL in & searchings logs w/ expanded timeframe.
The # authAttempts can stay where it's at ... #STRONTIUM activity is approx 100 attempts per IP per account