Search timeline

🔥Crank up the #SUM41 in your MP3 player and check out this new #APT41 research from the team now ⤵ï¸
Quote Tweet
🚨🚨 We’re releasing research on a persistent #APT41 campaign targeting U.S. state governments from May ‘21 – Feb ‘22. Grab a biker jacket, studded belt, hair bleach and read our SUMmary of #APT41’s activities. Highlight 🧵 mandiant.com/resources/apt4
Show this thread
2
2
13
ðŸŒ¶ï¸ So 🔥 Much 💥 Exciting 💪 Work â€¼ï¸ #APT41 #Mandiant
Quote Tweet
🚨🚨 We’re releasing research on a persistent #APT41 campaign targeting U.S. state governments from May ‘21 – Feb ‘22. Grab a biker jacket, studded belt, hair bleach and read our SUMmary of #APT41’s activities. Highlight 🧵 mandiant.com/resources/apt4
Show this thread
10
🚨 New 🇨🇳 #apt41 threat research 🚨 mandiant.com/resources/apt4 New persistent #apt41 campaign from May '21 - present targeting U.S. state governments. They are everywhere. Initial entry point through vulnerable web apps including usage of an 0-day 🧵
1
2
11
Show this thread
Really awesome thread by one of the authors on how #APT41 continues to be a menace even after a #indictment linked here #nevergonnagiveup justice.gov/opa/pr/seven-i
Quote Tweet
🚨🚨 We’re releasing research on a persistent #APT41 campaign targeting U.S. state governments from May ‘21 – Feb ‘22. Grab a biker jacket, studded belt, hair bleach and read our SUMmary of #APT41’s activities. Highlight 🧵 mandiant.com/resources/apt4
Show this thread
6
USAHerds is an animal disease tracking and management system used by state-level Departments of Agriculture. #APT41 obtained a hardcoded, static .NET machineKey that allowed them to exploit USAHerds instances at ALL 18 U.S. states.
Image
1
3
Show this thread
#APT41 must have taken a course on .NET deserialization attacks recently... 1⃣ Static machineKeys in USAHERDS CVE-2021-44207 2⃣ Directory traversal to obtain machineKey values for deserialization attacks 3⃣ Hunting for and harvesting of web.config files for later use
1
1
3
Show this thread
In multiple investigations, we’ve responded to #APT41 at one agency only to find that APT41 had also compromised a separate agency in the same state. We’re not entirely sure what they’re after, but whatever it is, it’s important.
1
8
Show this thread
Regardless of which application #APT41 targeted on any given day, their post-exploitation operations remained consistent with prior intrusions:
Quote Tweet
The group continues to use a combination of previous tooling, with enhancements and new techniques to remain stealthy. Notably, we cover: -Anti-analysis techniques on tried/true malware -Dead drop resolvers -Moar Cloudflare services in C2 (WSS, Cloudflare workers)
Show this thread
1
3
Show this thread
Our analysis adds onto plenty of great research out there that continues to prove one thing: #APT41 remain undeterred after the U.S. DOJ indictment. 👨â€âš–ï¸ðŸ‘©â€âš–ï¸ Now commence #SUM41 memes
1
9
Show this thread