digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

830
active users

#MITRE

0 posts0 participants0 posts today
BCWH<p>MITRE ATT&amp;CK &amp; CISA CVE Mapping<br>I have a connection established with CISA's CVE JSON and MITRE ATT&amp;CK's TAXII API. But how do I map them together?<br> <br><a href="https://wadebach.blackcatwhitehatsecurity.com/blogView.cfm?blogID=3#cvemapping" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wadebach.blackcatwhitehatsecur</span><span class="invisible">ity.com/blogView.cfm?blogID=3#cvemapping</span></a><br> <br><a href="https://mastodon.social/tags/Blog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blog</span></a> <a href="https://mastodon.social/tags/MITRE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITRE</span></a> <a href="https://mastodon.social/tags/ATTACK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ATTACK</span></a> <a href="https://mastodon.social/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://mastodon.social/tags/Mapping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mapping</span></a> <a href="https://mastodon.social/tags/Applications" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Applications</span></a></p>
Pyrzout :vm:<p>CISA looks to partners to shore up the future of the CVE Program <a href="https://www.helpnetsecurity.com/2025/09/12/cisa-cve-program-future/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/09/12</span><span class="invisible">/cisa-cve-program-future/</span></a> <a href="https://social.skynetcloud.site/tags/vulnerabilityassessment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilityassessment</span></a> <a href="https://social.skynetcloud.site/tags/government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>government</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/MITRE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITRE</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://social.skynetcloud.site/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://social.skynetcloud.site/tags/USA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USA</span></a></p>
Continued thread

#IOCs:
SHA256:
560afd97f03f2ed11bf0087d551ae45f2046d6d52f0fa3d7c1df882981e8b346

8b079bae684fd287c605de8acae338401a76a412c6a802faf2cf6e9ec0cf6224

0ba3b2871e0ad3b4fba615ea76e2d5f7cefa80e87468c6dcfc9b44feb1e5ea7a

C2dd4543678f514b5323944993552c106a3d250b0c35cf16c2bb2171ab0a0199

C23f6a4286dc18bbf1ff06420357da1af1132dddf37ad6f51d9915fccca6c97e

File names & directories:
Shields.msi

%USERPROFILE%\AppData\Local\Programs\Advanced PDF Shaper Ultimate\LdVBoxSVC.exe

C:\WINDOWS\system32\openwith.exe

URLs:
hxxps[:]//84.200[.]80.8/gateway/6caqmphx.fan5l
hxxps[:]//zerontwoposh[.]live/gateway/n5eepk7n.2a6s4

TLS Certificates:

SN: 29769a39032fdff8 | Thumb: 6f13c27a9150db7d02e1e1ff849921cc2bb0754e
SN: 3ac75d9f42ced25b2c4534f40d08b41ffefe4ab | Thumb: b938263deb95997f9d47ce9ef9817b5def90eafa

SN: 3b5db13bb882d9c4 | Thumb: f2b2e768359891f0543cd830d728c923bfc3c307
C2 JARM fingerprint:

3fd3fd20d0000000003fd3fd3fd3fd9c542afc474937e300923d7c192419b1

#MITRE Techniques:
Phishing (T1566)
User Execution: Malicious Copy and Paste (T1204.004)
System Binary Proxy Execution: Msiexec (T1218.007)
Virtualization/Sandbox Evasion: System Checks (T1497.001)
Hijack Execution Flow (T1574)
Obfuscated Files or Information: Steganography (T1027.003)

🚨 How #Rhadamanthys Stealer Slips Past Defenses using ClickFix
⚠️ Rhadamanthys is now delivered via ClickFix, combining technical methods and social engineering to bypass automated security solutions, making detection and response especially challenging.
👾 While earlier ClickFix campaigns mainly deployed #NetSupport RAT or #AsyncRAT, this C++ infostealer ranks in the upper tier for advanced evasion techniques and extensive data theft capabilities.

#ANYRUN Sandbox lets SOC teams observe and execute complex chains, revealing evasive behavior and providing intelligence that can be directly applied to detection rules, playbooks, and proactive hunting.

🔗 Execution Chain:
ClickFix ➡️ msiexec ➡️ exe-file ➡️ infected system file ➡️ PNG-stego payload

In a recent campaign, the phishing domain initiates a ClickFix flow (#MITRE T1566), prompting the user to execute a malicious MSI payload hosted on a remote server.

🥷 The installer is silently executed in memory (#MITRE T1218.007), deploying a stealer component into a disguised software directory under the user profile.

The dropped binary performs anti-VM checks (T1497.001) to avoid analysis.

In later stages, a compromised system file is used to initiate a TLS connection directly to an IP address, bypassing DNS monitoring.

📌 For encryption, attackers use self-signed TLS certificates with mismatched fields (e.g., Issuer or Subject), creating distinctive indicators for threat hunting and expanding an organization’s visibility into its threat landscape.

🖼️ The C2 delivers an obfuscated PNG containing additional payloads via steganography (T1027.003), extending dwell time and complicating detection.

🎯 See execution on a live system and download actionable report: app.any.run/tasks/a101654d-70f

🔍 Use these #ANYRUN TI Lookup search queries to track similar campaigns and enrich #IOCs with live attack data from threat investigations across 15K SOCs:
intelligence.any.run/analysis/
intelligence.any.run/analysis/
intelligence.any.run/analysis/
intelligence.any.run/analysis/

👾 IOCs:
84.200[.]80.8
179.43[.]141.35
194.87[.]29.253
flaxergaurds[.]com
temopix[.]com
zerontwoposh[.]live
loanauto[.]cloud
wetotal[.]net
Find more indicators in the comments 💬

Protect critical assets with faster, deeper visibility into complex threats using #ANYRUN 🚀

#infosecurity #defence #mitre

Защитные меры информационной безопасности как правило НЕ являются проактивными.

ML Defense Matrix — это комплексная коллекция 40+ техник защиты, специально разработанных для противодействия каждому вектору атак, задокументированному в фреймворке [MITRE ATLAS](atlas.mitre.org/).

Это очень верхнеуровневый документ, его определённо надо дорабатывать с коллегами, выстраивающими защиту.

github.com/wearetyomsmnv/ML-De

atlas.mitre.orgMITRE ATLAS™