🔗 expel.com
Full threat intel recap here: expel.com/blog/expel-q...
Full threat intel recap here: expel.com/blog/expel-q...
The trend is moving in the right direction but there's still more work to do since 45.1% aren't being blocked.
The trend is moving in the right direction but there's still more work to do since 45.1% aren't being blocked.
• Credentials → cloud services
• Malware → endpoints
• Misconfigurations → cloud infrastructure
Each surface is distinct. One defensive strategy doesn't cover all three. You need different plans for each.
• Credentials → cloud services
• Malware → endpoints
• Misconfigurations → cloud infrastructure
Each surface is distinct. One defensive strategy doesn't cover all three. You need different plans for each.
• Manufacturing: highest total incident volume (overtook financial services)
• Healthcare: disproportionately hit by non-targeted malware
• Pharma & chemical: highest proportion of identity attacks in top 10
• Manufacturing: highest total incident volume (overtook financial services)
• Healthcare: disproportionately hit by non-targeted malware
• Pharma & chemical: highest proportion of identity attacks in top 10
Biggest increase: secret key exposure, up 7.8 percentage points from Q2 to 26.8% of cloud incidents. Keys exposed through hardcoded credentials or supply chain attacks like Shai Hulud.
Biggest increase: secret key exposure, up 7.8 percentage points from Q2 to 26.8% of cloud incidents. Keys exposed through hardcoded credentials or supply chain attacks like Shai Hulud.
Non-targeted malware dominates at 64.7% of endpoint incidents. This swung back up from 50.2% in Q2.
Attackers are still using traditional tactics—malware, compromising public-facing systems—to get onto devices.
Non-targeted malware dominates at 64.7% of endpoint incidents. This swung back up from 50.2% in Q2.
Attackers are still using traditional tactics—malware, compromising public-facing systems—to get onto devices.
Modern identity controls (MFA, conditional access, monitoring) are working when implemented properly.
Modern identity controls (MFA, conditional access, monitoring) are working when implemented properly.
Overview of the campaign, IOCs, and file hashes: expel.com/blog/certifi...
Overview of the campaign, IOCs, and file hashes: expel.com/blog/certifi...
Full technical breakdown with IOCs: expel.com/blog/along-f...
Full technical breakdown with IOCs: expel.com/blog/along-f...
Small changes to existing attack chains can be enough to slip through.
Small changes to existing attack chains can be enough to slip through.
Turns out this was a Red Team engagement by Intrinsec. But the techniques are real and worth understanding.
Turns out this was a Red Team engagement by Intrinsec. But the techniques are real and worth understanding.
Commands hidden in the cookie field (__cfduid), encrypted and encoded to look like normal Cloudflare cookies. Designed to slip past TLS inspection.
GET /content/js/jquery/v3.4.3/min.js
Commands hidden in the cookie field (__cfduid), encrypted and encoded to look like normal Cloudflare cookies. Designed to slip past TLS inspection.
GET /content/js/jquery/v3.4.3/min.js