Randy Aybar
shumpsec.bsky.social
Randy Aybar
@shumpsec.bsky.social
DFIR @ Kroll
Reposted by Randy Aybar
March 4, 2025 at 11:00 PM
Reposted by Randy Aybar
we might be cooked y'all
March 5, 2025 at 4:48 AM
Reposted by Randy Aybar
CAN WE GET LESS OF THIS AND MORE OF THIS PLEASE
March 5, 2025 at 3:05 AM
Reposted by Randy Aybar
A fascinating report by Volexity! Shows that, with a built of effort, any type of attack is possible 👏

The "Nearest Neighbour attack" (very cool name, btw) involves connecting with nearby organizations and using their Wi-Fi networks to reach the main target organization.

www.volexity.com/blo...
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
KEY TAKEAWAYS Russian APT GruesomeLarch deployed a new attack technique leveraging Wi-Fi networks in close proximity to the intended target. The threat actor primarily leveraged living-off-the-land techniques. A zero-day privilege escalation was used to further gain access. Ukrainian-related work and projects were targeted in this attack, just ahead of Russian Invasion of Ukraine. In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever worked. The investigation began when an alert from a custom detection signature Volexity had deployed at a customer site (“Organization A”) indicated a threat actor had compromised a server on the customer’s network. While Volexity quickly investigated the threat activity, more questions were raised than answers due to a very motivated and skilled advanced persistent threat (APT) actor, who was using a novel attack vector Volexity […]
www.volexity.com
November 22, 2024 at 11:12 PM