Skip to content

Specific detections

Miroslav Stampar edited this page Mar 16, 2021 · 22 revisions

Computrace medium

If installed, in the event of a laptop being stolen, the Computrace software tracks the stolen computer and provides to authorities the information they need to get it back. The issue is that this same software can download and install unknown programs in an unauthorized manner, even if explicitly disabled by the user.

References:

Covenant medium

Covenant is a .NET C&C framework, that aims to (ab)use offensive .NET tradecraft capabilities and serve as a collaborative command and control platform for red teamers. Network security analysts should investigate similar detections and determine if such frameworks are authorized to be run inside the organizational network.

References:

DPRK SiliVaccine medium

Detection of network communication attempts for North Korea's SiliVaccine anti-virus software.

References:

Pushbug medium

Malicious campaign abusing push notifications to impact systems with malfeasant push notifications. This activity to date represents a type of social engineering, bypassing many security controls and potentially obtaining persistence by installing a service worker in the browser.

References:

Python BYOB medium

Python BYOB (Build Your Own Botnet) is an open-source project, that provides a library of packages and modules which provide a basic framework for testing the limits of security assets capacity for local network defense.

Note: Network security analysts should investigate similar cases to determine if such framework is authorized to run inside the organizational network.

SocGholish medium

Framework using several social engineering themes for impersonating browser updates (Chrome/Firefox), Flash Player updates, Microsoft Teams updates.

References:

Superfish medium

Detection of domains and IP addresses, that are related to Lenovo laptops preinstalled adware, named as Superfish.

References:

Contents


Clone this wiki locally