Trending
Curtis's Avatar

Curtis

@cybershtuff

Cloud, Incident Response, Threat Intelligence | ثريت انتل | @Invictus-ir.com | Previously U42 and PwC

29
Followers
77
Following
16
Posts
17.11.2024
Joined
Posts Following

Latest posts by Curtis @cybershtuff

🚨 Possible first Iranian wiper activity since the start of the war.

Handala (MOIS-linked) claims targeting Stryker Corporation, reportedly pushing a wiper to Intune-managed endpoints.

Claims currently unverified but seeing more public reporting on it.

Now, who's got samples for analysis?

11.03.2026 13:13 👍 0 🔁 0 💬 0 📌 0
They Came to Spy on America. They Stayed to Coach Little League. In the wake of the Cold War, some Soviet bloc spies decided their fake American lives weren’t so bad.

It’s no secret that investigative journalism is on life support. The economics of the profession, always shaky, have become increasingly untenable. If you enjoyed this, or any of my other work, and are looking for a full-time editor or writer, get in touch!

www.politico.com/news/magazin...

10.03.2026 19:36 👍 72 🔁 26 💬 1 📌 0
Post image

☁️ 🧪 We've been cooking in the lab!

In our new scenario you can play with EKS, ECR, pipelines and more fun stuff in the cloud.

Sign up and take advantage of our #BlackFriday deal!

🔗cloudlabs.invictus-ir.com

#DFIR #Cloud #Training #cybersecurity

28.11.2025 11:30 👍 3 🔁 0 💬 0 📌 0
The story of how we almost got hacked

The VendorVandals threat actor tried to compromise us using a phishing lure + fake WeTransfer delivery to achieve a BEC attack.

We followed the breadcrumbs and exposed their campaign.

Details 👇
www.invictus-ir.com/news/the-sto...

26.11.2025 18:25 👍 1 🔁 0 💬 0 📌 0

🎉BEHOLD! THE AGENDA! 🎉

The inaugural agenda features 15 talks detailing operational updates on the threat landscape, matters of attribution, and unique explorations of unconventional manifestations of state presence.

Get registered quick!!!

stateofstatecraft.com/agenda

18.09.2025 16:39 👍 5 🔁 1 💬 0 📌 0
Cloud Labs - Choose the plan that fits your needs

Cloud Labs is live!

🏗️ Build or increase your cloud incident response skills with realistic labs and scenarios.

Register for Cloud Labs: cloudlabs.invictus-ir.com

29.08.2025 12:38 👍 0 🔁 0 💬 0 📌 0
Black Hat First Look: Meet the New Microsoft Extractor Suite v4

💙Microsoft Extractor Suite v4 is here

𝘜𝘱𝘥𝘢𝘵𝘦-𝘔𝘰𝘥𝘶𝘭𝘦 -𝘕𝘢𝘮𝘦 𝘔𝘪𝘤𝘳𝘰𝘴𝘰𝘧𝘵-𝘌𝘹𝘵𝘳𝘢𝘤𝘵𝘰𝘳-𝘚𝘶𝘪𝘵𝘦

Learn more about the new features in the blog and thanks everyone that contributed!

invictus-ir.com/news/black-h...

#stayInvictus #CloudIncidentResponse #DFIR

28.07.2025 09:48 👍 0 🔁 0 💬 0 📌 0

Why am I so unimpressed by these strikes? Israel and the US have failed to target significant elements of Iran's nuclear materials and production infrastructure. RISING LION and MIDNIGHT HAMMER are tactically brilliant, but may turn out to be strategic failures. 🧵 1/17

23.06.2025 01:25 👍 2883 🔁 1126 💬 92 📌 268
Preview
What’s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia | Google Cloud Blog A Russia-sponsored threat actor is impersonating the U.S. Department of State, and using phishing to gain access to email accounts.

So @gabagool.ing (who will henceforth be referred to as "gabbot") and I wrote some stuff on some ASP phishing campaigns: cloud.google.com/blog/topics/...

Citizen Lab worked closely with one of the targets and shared their work on it also: citizenlab.ca/2025/06/russ...

18.06.2025 17:04 👍 10 🔁 7 💬 0 📌 2
Preview
MeteorExpress | Mysterious Wiper Paralyzes Iranian Trains with Epic Troll - SentinelLabs In the midst of an epic troll on a country-wide railway system, we discovered a new threat actor and their reusable wiper called Meteor.

Related:

www.sentinelone.com/labs/meteore...

18.06.2025 16:47 👍 1 🔁 0 💬 1 📌 0

#CharmingKitten #APT42 #TA453

Hash:
87144d0aa002a87376b673f7d0c0eb88

C2:
Telegram Bot used for error messages and auto-start messaging to the operator
computerlearning.ddns./net

Pivots:
bookstoragestore./com
lastfilterfile/.info
78.159.117./177
78.159.117./175
185.132.176./241
154.44.186./106

10.06.2025 11:47 👍 1 🔁 0 💬 0 📌 0
Post image

Dutch intelligence discover a new Russian APT—LAUNDRY BEAR

www.aivd.nl/documenten/p...

Microsoft calls it Void Blizzard. Their report is here: www.microsoft.com/en-us/securi...

27.05.2025 12:11 👍 21 🔁 12 💬 1 📌 1

The limited IOCs on this pointed toward an ORB network...nice to see some reporting that supports attribution.

24.05.2025 21:49 👍 1 🔁 0 💬 0 📌 0
High-level overview of JavaGhost's TTPs

High-level overview of JavaGhost's TTPs

This isn’t recycled noise on JavaGhost. It surfaces the often-overlooked details responders and CTI analysts actually need.

Practical takeaways include:
✔️ Mapped TTPs
✔️ IR checklist
✔️ Actor context & relevancy

invictus-ir.com/news/profili...

#CTI #CloudSecurity #AWS #DFIR #JavaGhost

22.05.2025 11:52 👍 1 🔁 0 💬 0 📌 0

Call-back Proxy Network: 103.131.213[.]89 | 182.185.156[.]45 – likely a mix of anonymous activity and normal activity.
Mass SMTP Tester: 134.199.148[.]132 – banner previously responded with Mass SMTP Tester header.

14.05.2025 12:46 👍 0 🔁 0 💬 0 📌 0
Preview
Tales from the cloud trenches: The Attacker doth persist too much, methinks | Datadog Security Labs A cloud attack targeting Amazon SES and persistence via AWS Lambda, AWS IAM Identity Center and AWS IAM

🚨 New blog from @securitylabs.datadoghq.com on fresh AWS TTPs! I pivoted & enriched their infra data to uncover the actor #JavaGhost is likely abusing callback proxy networks and leveraging Mass SMTP Tester.

🔗 securitylabs.datadoghq.com/articles/tal...

#CloudSecurity #ThreatIntel #CTI

14.05.2025 12:46 👍 1 🔁 0 💬 1 📌 0
Preview
ATT&CK v17: New Platform (ESXi), Collection Optimization, & More Countermeasures By: Amy Robertson and Adam Pennington

ATT&CK v17 is now live! This release includes the first version of the ESXi platform, a pile of defensive upgrades, and fresh content across Enterprise, Mobile, and ICS.

Check out our blog post describing the changes by Amy Robertson & @whatshisface.bsky.social at medium.com/mitre-attack....

22.04.2025 15:22 👍 6 🔁 2 💬 0 📌 1
Preview
Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows Since early March 2025, Volexity has observed multiple suspected Russian threat actors conducting highly targeted social engineering operations aimed at gaining access to the Microsoft 365 (M365) acco...

@volexity.com #threatintel: Multiple Russian threat actors are using Signal, WhatsApp & a compromised Ukrainian gov email address to impersonate EU officials. These phishing attacks abuse 1st-party Microsoft Entra apps + OAuth to compromise targets.

www.volexity.com/blog/2025/04...

#dfir

22.04.2025 16:39 👍 18 🔁 12 💬 0 📌 1
Cloud Heavy, Hybrid Ready: Lessons from BlackBasta and Scattered Spider

🚨 New blog: BlackBasta’s leaks show how ransomware crews still exploit hybrid environments while Scattered Spider leans fully into cloud.

Two actors, two strategies. What it means for IR, cloud defense, and ransomware readiness.

👉 invictus-ir.com/news/cloud-h...

#DFIR #CloudSecurity #CTI

02.04.2025 12:57 👍 0 🔁 1 💬 0 📌 0
Cloud Incident Readiness: Key logs for cloud incidents

🔍 New Blog: Essential Cloud Logs for Incident Response

🪵 Are you collecting the right logs for cloud security incidents? We break down the must-have logs to detect, investigate, and respond effectively in the cloud.

🔗 www.invictus-ir.com/news/cloud-i...

#dfir #aws #microsoft #google

19.03.2025 12:53 👍 0 🔁 1 💬 0 📌 0
Deep Dive: Forensic Analysis of eM ClientPermissions Table

🚨 New Blog: Forensic Analysis of eM Client 🚨

If you handle BEC investigations, you've probably encountered eM Client more than once. We break down the forensic traces this application leaves behind.

🔍 Read now: www.invictus-ir.com/news/forensi...

#CyberSecurity #DFIR #BEC #ThreatIntel #CTI

03.03.2025 17:40 👍 0 🔁 0 💬 0 📌 0
Preview
GitHub - invictus-ir/IOCs: Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more - invictus-ir/IOCs

Link to the IOCs and TTPs: github.com/invictus-ir/...

#DFIR #CTI #ThreatIntel

19.02.2025 14:57 👍 0 🔁 0 💬 0 📌 0

🚨 New Blog Alert: “Locked Out, Dropboxed In: When BEC Threats Innovate” 🚨

Dive into an intriguing BEC attack and discover how this threat actor navigated a cloud environment to evade detection. We’ve also mapped the TTPs and shared IOCs on our GitHub.

👉 www.invictus-ir.com/news/locked-...

19.02.2025 14:52 👍 1 🔁 0 💬 1 📌 0