Opens profile photo
Follow
Tal Maor
@talthemaor
Security Researcher #M365D Tweets are my own personal opinion.
EntrepreneurSeattlelinkedin.com/in/tal-maor-6a…Joined September 2013

Tal Maor’s Tweets

BEC should get the attention it deserves - Deploy FIDO2 and YubiKeys to avoid AiTM
Quote Tweet
Attackers behind a large-scale adversary-in-the-middle (AiTM) phishing campaign used stolen credentials and session cookies to skip the authentication process and perform follow-on business email compromise (BEC) campaigns against other targets. Details: msft.it/6016b2F3Q
1
Attackers behind a large-scale adversary-in-the-middle (AiTM) phishing campaign used stolen credentials and session cookies to skip the authentication process and perform follow-on business email compromise (BEC) campaigns against other targets. Details:
4
252
Months of work is finally published! Let's use our blog to raise some insights for all the defenders out there! Let's hunt AiTM phishing & cookie🍪replaying! 🧵 1/n
Quote Tweet
Attackers behind a large-scale adversary-in-the-middle (AiTM) phishing campaign used stolen credentials and session cookies to skip the authentication process and perform follow-on business email compromise (BEC) campaigns against other targets. Details: msft.it/6016b2F3Q
3
31
Show this thread
Today , and I are launching a new website to list cloud vulnerabilities and CSP security issues. The website will be driven by the community, enabling cloud defenders to search and view essential info about cloud vulnerabilities cloudvulndb.org 1/6
5
270
Show this thread
BEC patterns in Office events #1 (phishing edition 🐟) 1. Login to 'Office 365 Exchange Online' from uncommon ISP 2. 'New-InboxRule' event 3. Multiple 'Create' events 4. Multiple 'MoveToDeletedItems' (path = "Sent Items") 5. Multiple 'SoftDelete' events (path = 'Deleted Items")
2
Another great example that Oauth consent phishing campaigns are here to say! Make sure to monitor consent activities to high priv apps in your org (can be easly done using MDCA policies) "Youre only as strong as your weakest player"
Quote Tweet
Microsoft is tracking a recent consent phishing campaign, reported by @ffforward, that abuses OAuth request links to trick users into granting consent to an app named ‘Upgrade’. The app governance feature in Microsoft Defender for Cloud Apps flagged the app’s unusual behavior.
Show this thread
Image
7
I never imagined a security talk we gave ( + ) would lead someone into a journey he claims "actually changed my life", but apparently it did. So happy to see 's journey and progress.
Image
Quote Tweet
My BlueHound talk was just released! It's about my #bloodhound journey and a tool I wrote to automate a methodology for defenders I presented last year. Hope you will enjoy! sector.ca/sessions/bhpd-
1
14
Super cool as always.
Quote Tweet
Proud to release BloodHound 4.0 - AzureHound, one of our biggest releases to date. As always, the release can be found on the repo, as well as the new AzureHound collector. Linux builds coming whenever CI finishes them! github.com/BloodHoundAD/B
Between Sep 2019 and Jun 2020, STRONTIUM launched credential harvesting attacks against tens of thousands of accounts at >200 organizations. Learn about the group’s shifting approach to credential harvesting, and get guidance for proactive defense:
2
147
Show this thread