home.social

#operationalsecurity — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #operationalsecurity, aggregated by home.social.

  1. Threat Actors Formalize Operational Security Playbook

    Cybercrime players are now treating operational security as a sophisticated game-changer, and it's time for you to level up your security strategy beyond just using VPNs. A battle-tested three-tier infrastructure model has emerged, separating exposure, execution, and monetization to safeguard high-stakes operations.

    osintsights.com/threat-actors-

    #OperationalSecurity #CardingOperations #ThreatActors #Vpns #Cybercrime

  2. APT37’s Ruby Jumper campaign demonstrates a mature approach to air-gap traversal.

    Observed tradecraft includes:
    • LNK-based initial execution
    • Embedded PowerShell payload extraction
    • Ruby interpreter abuse (v3.3.0)
    • Scheduled task persistence (5-minute interval)
    • USB-based covert bidirectional C2
    • Multi-stage backdoor deployment
    Toolset: RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, FOOTWINE, BLUELIGHT.

    The removable media relay model enables:
    – Command staging offline
    – Data exfiltration without internet access
    – Lateral spread across isolated systems
    – Surveillance via Windows spyware
    This reinforces a critical point:
    Air-gap controls must extend beyond physical disconnection — including USB governance, device auditing, behavioral monitoring, and strict runtime execution policies.

    Are critical infrastructure operators prepared for USB-mediated C2 relays?

    Source: bleepingcomputer.com/news/secu

    Engage below.

    Follow TechNadu for high-signal threat intelligence insights.
    Repost to elevate awareness.

    #Infosec #APT37 #AirGapSecurity #ThreatModeling #MalwareAnalysis #NationStateThreats #USBExfiltration #SOC #DetectionEngineering #CyberDefense #OperationalSecurity #ThreatHunting #ZeroTrustArchitecture

  3. Did you miss last week's podcast with @dragosinc's @hacks4pancakes? In this episode of the Breaking Badness Cybersecurity Podcast, Lesley joins @NotTheLinux and @danonsecurity to share insights on OT challenges, incident response, and bridging the gap between cyber and operations. Don’t miss out on this enlightening discussion! 🎙️

    🎧 Listen here: domaintools.com/resources/podc

    #cybersecurity #CyberPodcast #IncidentResponse #OperationalTechnology #OperationalSecurity