LeeArchinal ,
@LeeArchinal@ioc.exchange avatar

Happy Monday everyone!

The National Security Agency has released a report detailing evidence of North Korean actors exploiting weak Domain-based Message Authentication, Reporting and Conformance (DMARC) records to conceal social engineering attempts. Without proper DMARC configuration, the NSA says that the actors were able to spoof emails as if they came from a legitimate domain. They also provide more background information about DMARC configurations and examples of the emails and email headers.

While detecting malicious emails can be accomplished by deploying email gateways, antivirus, and spam filters just to name a few. But what happens when some slip through the tracks? Then you look for the behaviors! A common TTP and behavior is to provide the victim with a malicious document that will run some code or commands to progress the attack. In a Microsoft environment, this is commonly accomplished by executing , Windows Command Shell (cmd.exe), or other living-off-the-land binaries (LOLBINs). And that is the basis of this Cyborg Security Community Edition Hunt Package! Enjoy the article, get your free account, and Happy Hunting!

Potential Maldoc Execution Chain Observed
https://hunter.cyborgsecurity.io/research/hunt-package/b194088b-c846-4c72-a4b7-933627878db4

Article source:
https://media.defense.gov/2024/May/02/2003455483/-1/-1/0/CSA-NORTH-KOREAN-ACTORS-EXPLOIT-WEAK-DMARC.PDF

  • All
  • Subscribed
  • Moderated
  • Favorites
  • cybersecurity
  • kamenrider
  • Rutgers
  • steinbach
  • Lexington
  • cragsand
  • mead
  • RetroGamingNetwork
  • mauerstrassenwetten
  • loren
  • xyz
  • PowerRangers
  • AnarchoCapitalism
  • WatchParties
  • itdept
  • supersentai
  • neondivide
  • space_engine
  • AgeRegression
  • WarhammerFantasy
  • Teensy
  • learnviet
  • bjj
  • khanate
  • electropalaeography
  • MidnightClan
  • jeremy
  • Mordhau
  • fandic
  • All magazines