(1/2) TL;DR "DLL sideloading attack is the most successful
attack as most EDRs fail to detect, let alone block, it." A scholarly and unbiased examination of how top EDR detects APT threats by @MDPIOpenAccessmdpi.com/2624-800X/1/3/…
(2/2) Teams.exe is used by Cobalt Strike malleable C2 to beacon, undetected by most EDR.
It would be cool if EDR had network-based UEBA to detect these anomalous egress network connections. While some network gateways offer this, it would be more beneficial to have it detected at endpoint due to #WorkFromHome
• • •
Missing some Tweet in this thread? You can try to
force a refresh
(1/x) M365 changes to be aware of 1) End-users can purchase PowerBI on their on personal credit cards to bypass IT 2) End-users can purchase Windows 365 Cloud PC VMs on their own personal credit cards to bypass IT 3) End-users can create security groups (even if you disabled it)
4) End-users were automatically enrolled into Bing Search Rewards which indexes corporate data into Bing Search 5) Bing Search now collects data in Microsoft Word for the "Reuse Files" feature 6) Teams Recordings now expire after 60 days
7) The only way to prevent account lockouts from brute force is to create an Authentication policy (globally in web interface) or for selected users with PowerShell new-AuthenticationPolicy 8) End to End encryption for Teams Calling is off by default
Forensic Investigations in o365 - a short thread on why it’s getting harder and not easier for investigators. 1) Historically the first thing we used to do was enable an EMS E5 trial license in the customer tenant, as that allowed us to have 6 months of MCAS logs. This is gone!
Now, when you enable an MCAS trial, you must manually enable audit logging against O365, so there is no retroactive logs that magically appear 😩… it gets worse tho.. let’s talk about Azure AD “free.” This is what “E1 or E3” gets you
You get 7 days of AAD sign-in and audit logs
Historically when you enabled an AAD P1 or P2 or EMSE5 trial, you could go back 30 days. Now? When you enable the trials, no retroactive logs magically appear. 😭
So at this point the only forensic logs available in O365 beyond 7 days is the Security and Compliance Center Log…
New phishing campaign successfully bypasses Microsoft ATP (Office ATP, Defender ATP, and Azure ATP). It also bypasses SmartScreen. Works by sending an .HTM attachment or .ZIP containing .HTM.
IOCs instantrep.xyz secured.com.awi-o.online json.geoiplookup.io
The reason this attack is so effective at reaching inbox: 1. Originates from a compromised mailbox, so it passes SPF, DMARC and DKIM. 2. The .HTM is not malicious, so sandbox detonation is not a problem. 3. There is no remote URL attempted unless the user clicks their username.
I've received the same payload from two different compromised accounts at different companies. The body of the email is the same:
"Remittance advice required."
Firstname Lastname (of compromised user)
CFO