.@CrowdStrike assertion is that first hacking group (FANCY BEAR) in #DNCHack is APT28. If so, that is a strong attribution to Russia.
-
-
.
@CrowdStrike says the "COSY BEAR" group in#DNCHack is RU for this reason. But tbh, looks more like a piggyback oppic.twitter.com/SVFubyejAF
1 reply 4 retweets 4 likes -
COSYBEAR is an interesting implant. Python and Powershell; comms via .NET using AES with a fixed sym-key
#DncHackpic.twitter.com/CpCXNEQTux
2 replies 16 retweets 12 likes -
That puts COSYBEAR here on the
@daveaitel implant-sophistication scale :)#DncHackpic.twitter.com/DXNIhVplhx
4 replies 11 retweets 8 likes -
Fixed IV/key in COSYBEAR means can traffic-decrypt from pcap. Clearly not written by folks who know crypto
#DNCHackpic.twitter.com/BrPLBNjli9
1 reply 2 retweets 7 likes -
-
lolwtf? COSYBEAR operators apparently are lame script kiddies. Clearing event logs is like the worst opsec
#DncHackpic.twitter.com/KW2AA1iW7a
2 replies 3 retweets 6 likes -
Serious Q: What AV does DNC run? How did it possibly miss an implant clearing win-event logs w/ WMI persistance?pic.twitter.com/bls5QPOn8R
2 replies 6 retweets 7 likes -
1 reply 2 retweets 6 likes -
For some reason
@CrowdStrike listing IOCs as SHA256, when industry standard is SHA1. Makes it harder to search for.pic.twitter.com/p2BQY92hXz
3 replies 2 retweets 3 likes
.@CrowdStrike Also for some reason clearly have, but aren't sharing the binaries. Seems optimized to stop people checking their results.
-
Btw, if you want to piggyback onto COSYBEAR, its startup module downloaded w/ fixed AES/IV dl-ed over HTTP (port80)pic.twitter.com/HejStU8MWi
0 replies 1 retweet 2 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
Pwn All The Things
