Tag: Threat Research Blog

ELFant in the Room – capa v3

This article has been indexed from Threat Research Blog Since our initial public release of capa, incident responders and reverse engineers have used the tool to automatically identify capabilities in Windows executables. With our newest code and ruleset updates, capa v3…

PST, Want a Shell? ProxyShell Exploiting Microsoft Exchange Servers

This article has been indexed from Threat Research Blog In August 2021, Mandiant Managed Defense identified and responded to the exploitation of a chain of vulnerabilities known as ProxyShell. The ProxyShell vulnerabilities consist of three CVEs (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) affecting…

PST, Want a Shell? ProxyShell Exploiting Microsoft Exchange Servers

This article has been indexed from Threat Research Blog In August 2021, Mandiant Managed Defense identified and responded to the exploitation of a chain of vulnerabilities known as ProxyShell. The ProxyShell vulnerabilities consist of three CVEs (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) affecting…

Detecting Embedded Content in OOXML Documents

This article has been indexed from Threat Research Blog On Advanced Practices, we are always looking for new ways to find malicious activity and track adversaries over time. Today we’re sharing a technique we use to detect and cluster Microsoft…

UNC215: Spotlight on a Chinese Espionage Campaign in Israel

This article has been indexed from Threat Research Blog This blog post details the post-compromise tradecraft and operational tactics, techniques, and procedures (TTPs) of a Chinese espionage group we track as UNC215. While UNC215’s targets are located throughout the Middle…

UNC215: Spotlight on a Chinese Espionage Campaign in Israel

This article has been indexed from Threat Research Blog This blog post details the post-compromise tradecraft and operational tactics, techniques, and procedures (TTPs) of a Chinese espionage group we track as UNC215. While UNC215’s targets are located throughout the Middle…

capa 2.0: Better, Faster, Stronger

This article has been indexed from Threat Research Blog We are excited to announce version 2.0 of our open-source tool called capa. capa automatically identifies capabilities in programs using an extensible rule set. The tool supports both malware triage and…

capa 2.0: Better, Faster, Stronger

This article has been indexed from Threat Research Blog We are excited to announce version 2.0 of our open-source tool called capa. capa automatically identifies capabilities in programs using an extensible rule set. The tool supports both malware triage and…