It's been an incredibly busy few weeks over here, I haven't had much time to get outside and touch some grass. But the weather is getting warming and I am so ready for it! I hope you enjoy this weeks email! I would love if you would reply and tell me which parts you liked or didn't care for. It won't hurt my feelings, I promise! 🩺Threat PulseMalicious Adobe, DocuSign OAuth apps target Microsoft 365 accounts
This is one of those social engineering techniques that can be pretty sneaky if users are not paying attention or don’t know the red flags. Definitely incorporate education and awareness to users around these attacks. Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension
If you’re a defender, you have got to have a strategy for browser extensions. They should be strictly controlled. Don’t allow users to install them on their own if at all possible. I’d also recommend incorporating this into security awareness programs. Red Report 2025: Unmasking a 3X Spike in Credential Theft and Debunking the AI Hype
Credentials have been king for a while now, and they will continue to be until the world moves away from passwords, which I don’t believe is anytime soon. Protecting credentials and the authentication process is paramount to defensive security. Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice
This trend of leveraging legitimate software for malicious purposes is not new. LOLBins (living off the land binaries) have been abused by threat actors for some time now. That being said, RMM usage is going up. Take it from someone who uses this exact strategy for internal pentests. It’s incredibly effective. Best defense here is to use application control to block any and all RMM that are not in use in your organization. New York sues Allstate and subsidiaries for back-to-back data breaches
What’s the lesson here? You’ve got to take this cybersecurity stuff seriously, especially when a security incident occurs. Yes, there are very real short term consequences but I dare say the long term consequences of getting caught in this kind of a situation is much worse. 🔐Securing the StackLAPS: The Quick Fix for a Huge Security ProblemWhat You Need Microsoft Local Administrator Password Solution (LAPS) (Now called Windows LAPS) is used to enforce unique, randomly generated local admin passwords on every machine. Yes even servers. Why You Need It Many organizations still use the same local admin password across multiple machines. If an attacker gets that password, they can use it to move laterally across the network, escalate privileges, and deploy ransomware. LAPS fixes this by ensuring that every machine has a unique, automatically rotating password. How to Do It
LAPS-Related Defensive Advice
LAPS is simple, free, and effective. If you haven’t deployed it, now’s the time. 🔐Memes & MayhemCompliments to @CheddarB0b42 for this one. Not the first time I have seen this, but it never stops being funny. 😂 👨💻Behind the ConsoleWorking on increasing the amount of content I am putting out there. This newsletter is one of those initiatives. I’m also posting more on LinkedIn and will be reviving my LinkedIn Behind The Hack newsletter. I’d like to share more behind the scenes pentesting content there. Still aimed at helping IT/security people! Also, I have some cool and fun content being cooked up with support from NinjaOne. Some of which will be social media posts, but what I am really excited for is the longer form YouTube style stuff and a few things I can’t talk about yet! 😊 If you made it this far, I super appreciate you. I hope the emails I send you, bring you value. If you'd like to return the favor, I have a 15% off sale on my Etsy store and FREE shipping on all orders over $35! Check out the cool shirts, hoodies and stickers here --> https://swag.ethicalthreat.comThat’s all for now. Hope you have a super awesome week! All the best "Spirit of a hacker heart of a defender" |
Pentester/recovering sysadmin Self-proclaimed Ethical Threat Active Directory Security Connoisseur Offensive stuff — securit360.com Host Cyber Threat POV — offsec.blog SWAG — swag.ethicalthreat.com 📩 By subscribing, you’ll get exclusive access to industry insights, actionable tips for securing your environments, behind-the-scenes content from my pentests, and updates from someone who keeps a pulse on the ever-changing cyber threat landscape.
Admin due diligence crushes clickgrab tricks. Ethical Threat Insight: How to Spot and Stop Clickgrab Attacks Clickgrab isn’t just about tricking users, it’s about tricking you, the admin. The ClickGrab technique is super tricky because of the fake-CAPTCHA pages. The technique is centered around hijacking your clipboard with malicious PowerShell commands and then tricking you into pasting the malicious commands into the run dialog. But there is hope! PasteEater is a super cool utility that...
More isn’t better. Better is better. Quantity fades. Quality lasts. Ethical Threat Insights: Deception, the best ROI in Security There is a misconception that more security alerts == safer environment. The reality is that’s not true. Better alerts == more actionable evidence means you’re responding to what matters most, not when your server goes haywire because of a benign scheduled task. Deception is the best ROI in security because: It’s inexpensive (especially compared to “traditional”...
Attackers love certificates. They open doors most people forget to lock. Ethical Threat Insight: Certificate Abuse Attacks Think certificates only protect websites? Inside your network, they’re like digital ID cards for users, computers, web servers, and even domain controllers. But here’s the problem… A weak or misconfigured certificate can let attackers: Impersonate administrators Escalate privileges Persist quietly Simple tip: Start by auditing your AD Certificate Services (ADCS) using...