More Attack Context for Faster Triage, Response, and Hunting. Now Available to Every SOC 

ANY.RUN has expanded access to Threat Intelligence capabilities for SOC and MSSP teams, backed by live attack data from 15,000 organizations. 

Here’s how your team can test TI’s impact on triage quality, response speed, and threat hunting workflows. 

See How Threat Intelligence Accelerates Your SOC 

ANY.RUN now offers 20 premium requests in Threat Intelligence Lookup and YARA Search as part of the Free plan.  

You can get immediate threat context for over 40 types of IOCs, IOBs, and IOAs belonging to the latest malware & phishing attacks. All data is sourced from real sandbox investigations by ANY.RUN’s community of 15,000 organizations and 600,000 security analysts and experts. 

AI assistant interprets a lookup request in natural language, helps select sandbox analyses of malware using a TTP

AI-assisted search is available directly in the query flow, allowing analysts to use natural language and move from question to results without manual query building. 

With this expanded access, SOC and MSSP teams can explore Threat Intelligence capabilities in their workflows and see how it affects core SOC processes for faster and more confident operations

  • Reduce triage time: Validate alerts against ANY.RUN’s threat database to get immediate verdicts, full context, and access to related samples and activity. 
  • Improve response accuracy: Pivot from a single indicator to connected infrastructure, artifacts, and behavior to understand how the attack unfolds and what else needs containment. 
  • Run more effective threat hunts: Test hypotheses against live attack data, find related samples with YARA Search, and confirm relevance before expanding the hunt. 
  • Build detections based on real attacks: Use discovered patterns and artifacts to create or refine detections aligned with current malware and phishing activity. 

This directly impacts key SOC metrics, including reduced time per investigation, lower escalation rates, and faster Mean Time to Respond. 

Accelerate security workflows for faster triage & response.
Test Threat Intelligence in your SOC or MSSP.



Contact us


AI Search for Streamlined Investigations 

To speed up investigations and simplify how analysts work with Threat Intelligence, TI Lookup now includes AI-assisted search directly in the search bar.  

AI Search suggesting a lookup parameter

Analysts can use natural language to query data, while the system automatically translates requests into structured queries with the correct parameters and wildcards. 

This removes time spent on query construction and reduces friction in the workflow. Analysts move faster from alert to context, run more queries in less time, and get consistent results without additional steps. 

Fueling Core SOC Workflows 

Threat intelligence becomes truly valuable when it integrates into everyday operations. Here’s how it reinforces the three pillars of any SOC. 

1. Triage: From Guesswork to Confident Decisions 

Alert volume is the defining operational challenge for most SOC teams. The ability to validate an alert quickly and to make a confident decision about whether to close it or escalate directly determines how efficiently a team can operate. 

With ANY.RUN’s threat intelligence, analysts can immediately check an incoming indicator against a broad base of real-world attack data. Known-malicious infrastructure, recognized malware patterns, and previously documented campaigns can be matched in seconds. This means: 

  • Faster, evidence-backed decisions on alert validity; 
  • measurable reduction in the percentage of escalations driven by uncertainty rather than confirmed risk; 
  • Lower analyst cognitive load during high-volume periods. 

destinationIP:”198.37.119.56″ 

Quick verdict on the suspicious IP, campaign relations, infrastructure, and IOCs

Analysts spend less time on inconclusive alerts and more time on confirmed threats. With documented context to support every decision. 

2. Response: Seeing the Bigger Picture 

Once an incident is confirmed, speed and precision matter. The quality of the response depends on how well the team understands the threat: its connections, its infrastructure, its behavioral patterns, and its likely next moves. Two clicks in TI Lookup search results cited above take your analyst to a sandbox session of malware detonation and attack chain exposure:  

Move from TI Lookup results to sandbox analyses exposing malware’s behavior

ANY.RUN’s threat intelligence enables response teams to map the relationships between indicators and the broader campaigns or actor groups behind them. Shared infrastructure, overlapping TTPs, and connected artifacts can be identified quickly, giving responders a structural understanding of what they are dealing with, not just a list of individual indicators. 

This translates into: 

  • More complete scoping of incidents, with fewer blind spots; 
  • Targeted containment and remediation actions grounded in evidence; 
  • Higher confidence in response decisions

Overreaction and underreaction are reduced at the same time. The response becomes targeted, not reactive. 

3. Threat Hunting: Testing Hypotheses Against Reality 

Proactive threat hunting requires the ability to test hypotheses against real-world data. Analysts need to move from a suspicion about adversary behavior to a confirmed or refuted finding with enough evidence to act. 

ANY.RUN’s threat intelligence gives hunters access to a rich, searchable base of behavioral data from real-world malware analysis. Campaign linkages, attacker infrastructure patterns, and behavioral signatures can all be researched in depth.  

YARA Search accumulating artifacts and sandbox analyses

YARA Rules Search adds a further dimension, allowing hunters to build and validate detection logic against current threat data. 

The result is a hunting capability that is grounded in current, real-world evidence rather than theoretical models. It enables teams to find genuine threats and build detection coverage that reflects how adversaries actually behave. Hunting shifts from speculative to evidence-driven. 

How Threat Intelligence Impacts Your Business Outcomes  

Behind every alert, investigation, and response action, there is a business impact quietly accumulating. 

For Security Operations Teams (SOCs & MSSPs):

  • Alert validation accelerates, reducing the time from detection to decision. 
  • Fewer escalations are driven by uncertainty; each escalation carries stronger evidentiary weight. 
  • Investigation time decreases as analysts access contextualized data without pivoting between tools. 
  • Analyst confidence improves, reducing the hesitation that slows response in high-pressure situations 

For the Organization:

  • Incident costs fall when threats are understood accurately and responded to precisely. 
  • Faster response timelines limit attacker dwell time and reduce the scope of potential damage. 
  • The risk of missing significant threats decreases as detection and investigation are backed by broad, current intelligence. 
  • Security investments deliver more measurable returns when team capacity is focused on real, confirmed risk. 

Scale SOC Performance with Full Access to Threat Intelligence from ANY.RUN 

The Free plan is a genuine starting point: a full-capability evaluation that lets teams verify the value of ANY.RUN’s intelligence on real workflows. For organizations ready to operationalize threat intelligence at scale, ANY.RUN offers paid plans designed for different operational needs. 

ANY.RUN’s TI plans & pricing

These include Live, Core, and Complete plans, allowing teams to choose the level of access and integration that fits their workflows and scale.  

Across these plans, organizations can leverage the full set of threat intelligence capabilities, including:  

1. Threat Intelligence Feeds 

Continuous streams of validated indicators enriched with behavioral context from the sandbox analyses, delivered directly into SIEM, EDR, IDS/IPS, and SOAR systems. This enables automated enrichment and faster detection pipelines. 

2. Threat Intelligence Reports: full access 

Structured analyses of active campaigns, malware families, and attacker techniques. These reports provide ready-to-use insights for both operational response and strategic planning.  

TI Reports: most pressing threats, most dangerous APTs

Close blind spots and reduce exposure to critical incidents.
Integrate ANY.RUN’s Threat Intelligence in your SOC.
 



Contact us


What makes them particularly useful in operations: 

  • Clear breakdowns of campaigns, including tactics, techniques, and procedures
  • Context around how attacks unfold in real environments
  • Indicators and infrastructure tied together into meaningful clusters
  • Ready-to-use insights that support both immediate response and long-term defense

Reports act as a bridge between raw telemetry and strategic understanding. They help teams not only react faster, but also recognize patterns before they escalate into incidents. 

3. Threat Landscape 

A contextual layer that maps threats to industries and geographies, helping organizations understand where specific risks are most relevant to their business. 

threatName:”vidar” 

Lookup shows: Vidar trojan now targeting education, government, IT, and telecom in Europe and Americas 

Together, these capabilities support key business objectives: 

  • Reducing mean time to detect and respond (MTTD/MTTR); 
  • Lowering operational costs of incident handling; 
  • Improving analyst efficiency and capacity utilization; 
  • Strengthening risk management and compliance posture. 
ANY.RUN TI plans

The result is a measurable improvement in how security operations contribute to overall business resilience. 

Final Thoughts

The gap between threat detection and effective response is not primarily a technology problem. It is a data problem. When analysts have access to rich, current, contextual intelligence at the moment they need it, decisions improve and outcomes follow. 

ANY.RUN’s unified threat intelligence — TI Lookup, TI Feeds, TI Reports, and YARA Search, all powered by real sandbox data from 15,000 organizations — gives SOC and MSSP teams that foundation. The free plan removes the evaluation barrier: any team can run it through real workflows, on real alerts, before committing to anything. 

For teams that operationalize it, the cumulative effect is a SOC that is measurably faster, more accurate, and more confident — and an organization that is measurably harder to compromise and cheaper to defend. 

About ANY.RUN   

ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams investigate threats faster and with greater clarity across modern enterprise environments.   

It allows teams to safely execute suspicious files and URLs, observe real behavior in an Interactive Sandbox, enrich indicators with immediate context through TI Lookup, and monitor emerging malicious infrastructure using Threat Intelligence Feeds. Together, these capabilities help reduce investigation uncertainty, accelerate triage, and limit unnecessary escalations across the SOC.   

ANY.RUN is trusted by thousands of organizations worldwide and meets enterprise security and compliance expectations. It is SOC 2 Type II certified, demonstrating its commitment to protecting customer data and maintaining strong security controls. 

What is included in the expanded entry-level plan?

It includes 20 investigations in Threat Intelligence Lookup with AI-assisted search, access to YARA search, and the free Threat Intelligence Reports to evaluate real workflows.

How is this different from a typical trial?

It is not a limited demo. It allows teams to test threat intelligence directly within their SOC processes, using real alerts and investigations.

What data powers ANY.RUN’s threat intelligence?

It is generated from real-world malware analyses in the ANY.RUN Interactive Sandbox, enriched with behavioral data, infrastructure links, and campaign context.

How does AI search help analysts?

It simplifies query building by translating intent into structured search parameters, reducing time spent on syntax and accelerating investigations.

Can this be integrated into existing security infrastructure?

Yes, paid plans support integration with SIEM, SOAR, and other security systems, enabling automated workflows and enrichment.

Who is this most relevant for?

SOC teams, MSSPs, and security leaders who want to improve decision speed, reduce uncertainty, and lower incident response costs.

The post More Attack Context for Faster Triage, Response, and Hunting. Now Available to Every SOC  appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data

Researcher says the missing piece is a governance-driven intelligence layer that turns SBOM and VEX data into explainable security decisions.

The post Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data appeared first on SecurityWeek.

SecurityWeek – ​Read More

Mirai Botnet Targets Flaw in Discontinued D-Link Routers

The exploitation of the command injection vulnerability started one year after public disclosure and PoC exploit code publication.

The post Mirai Botnet Targets Flaw in Discontinued D-Link Routers appeared first on SecurityWeek.

SecurityWeek – ​Read More

How Google just revamped Gemini Enterprise for the agentic era – here’s what’s new

Meet Gemini Enterprise Agent Platform, the new developer tool for managing fleets of agents at scale.

Latest news – ​Read More

Oracle Patches 450 Vulnerabilities With April 2026 CPU

The company released 481 new security patches across 28 product families, including over 300 fixes for remotely exploitable, unauthenticated flaws.

The post Oracle Patches 450 Vulnerabilities With April 2026 CPU appeared first on SecurityWeek.

SecurityWeek – ​Read More

Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug

Microsoft has released out-of-band updates to address a security vulnerability in ASP.NET Core that could allow an attacker to escalate privileges.
The vulnerability, tracked as CVE-2026-40372, carries a CVSS score of 9.1 out of 10.0. It’s rated Important in severity. An anonymous researcher has been credited with discovering and reporting the flaw.
“Improper verification of cryptographic

The Hacker News – ​Read More

Google Antigravity in Crosshairs of Security Researchers, Cybercriminals

Researchers discovered a remote code execution vulnerability and cybercriminals are using its reputation to deliver malware.

The post Google Antigravity in Crosshairs of Security Researchers, Cybercriminals appeared first on SecurityWeek.

SecurityWeek – ​Read More

IR Trends Q1 2026: Phishing reemerges as top initial access vector, as attacks targeting public administration persist

  • Phishing reemerged as the most observed means of gaining initial access, accounting for over a third of the engagements where initial access could be determined. Phishing has not been the top vector for initial access since Q2 2025.
  • Public administration and health care tied as the most targeted industry verticals, each accounting for 24 percent of all engagements. This is the third consecutive quarter where public administration has been the most targeted industry vertical.  
  • Pre-ransomware incidents made up just 18 percent of engagements this quarter, and we did not observe any ransomware deployment due to early and swift mitigation from Cisco Talos Incident Response (Talos IR). This is a slight increase from last quarter but overall very low compared to Q1 and Q2 2025, when we observed ransomware in 50 percent of engagements.

AI tool leveraged in phishing campaign 

IR Trends Q1 2026: Phishing reemerges as top initial access vector, as attacks targeting public administration persist

Talos IR responded to a campaign that leveraged phishing, the most common means of initial access this quarter, to compromise the most targeted industry vertical this quarter: public administration. Notably, the actors leveraged the SoftrAI-based web application development service, marking the first time we have documented the use of a specific AI tool by an adversary in a phishing campaign. Softr was used to generate a credential harvesting page targeting users’ Microsoft Exchange and Outlook Web Access (OWA) accounts. 

State-sponsored and criminal actors have been observed abusing large language models (LLMs) to aid in the development of phishing lures, malicious scripts, and other tasks. DDoS-as-a-service actors have adopted AI algorithms for defense evasion and attack orchestration. While this is the first time we have documented the use of a specific AI tool in a Talos IR incident, we have moderate confidence that malicious actors have used Softr’s AI-powered web application creation platform since at May 2023, based on Cisco Umbrella data and other telemetry, and have done so with increasing frequency to date.    

This incident demonstrates how AI tools can lower the barrier to entry for less sophisticated actors and/or accelerate the speed of phishing and credential-harvesting campaigns. Using a form template and the “vibe coding” feature, a phishing page like the one used in this attack could be quickly created with a few AI prompts and no code. Phishing pages built with Softr can direct data to a disposable external data store, such as Google Sheets, and send alerts for new captures via email — all without code.    

Crimson Collective seen for the first time   

Talos IR experienced its first case involving Crimson Collective, a cyber extortion group that appeared in September 2025. This attack highlighted the use of valid accounts for initial access, the second most commonly observed means of initial access this quarter. This attack also notably involved targeting exploit weaknesses, the second-most observed security weakness, accounting for 25 percent of all engagements. We attribute this activity to Crimson Collective based on IPs associated with the group that were used to scan the victim’s ASA firewalls, as well as an overlap of observed tactics and techniques with publicly reported Crimson Collective attacks. 

The incident began when a GitHub Personal Access Token (PAT) was inadvertently published on a public-facing website, exposing the organization to adversaries for several months. Upon obtaining access, the adversary used TruffleHog, an open-source tool commonly utilized by security professionals, to scan thousands of victim GitHub repositories for additional secrets and sensitive information. This approach allows attackers to perform reconnaissance without triggering suspicion, as they are leveraging standard, legitimate tools. The attacker’s discovery of client secrets through TruffleHog enabled further access to the victim’s Azure cloud storage, where they used Microsoft Graph API calls to authenticate, explore, and exfiltrate data. The abuse of legitimate cloud APIs demonstrates a growing trend where threat actors use native platform functionality to blend into normal user activity, making detection more challenging. 

In addition to exfiltrating data, the adversary attempted to inject malicious code into multiple GitHub repositories. This code was designed to harvest any new secrets committed in the future, sending them to adversary-controlled infrastructure. Though these attempts were largely thwarted by the expiration of targeted secrets and effective security controls, the tactic reflects an emerging trend of supply chain and development environment attacks.  

Ransomware trends 

Ransomware experiences slight increase, remains low overall  

Pre-ransomware incidents made up just 18 percent of engagements this quarter, and we did not observe any ransomware encryption due to early and swift mitigation from Talos IR. This is a slight increase from last quarter, when ransomware and pre-ransomware collectively comprised 13 percent of engagements, but overall very low compared to Q1 and Q2 2025, when we observed ransomware in 50 percent of engagements. Attribution is challenging in pre-ransomware events because there are no encryptors or ransom notes, but we assess that Rhysida ransomware and MoneyMessage ransomware accounted for two of the engagements. 

While we did not observe many active and prolific ransomware-as-a-service (RaaS) operations, like Qilin or Akira, this likely does not indicate these major players are decreasing operations, as their data leak sites remain consistently active.    

Rhysida ransomware actors use uncommon backdoor, Meowbackconn  

Talos IR responded to a ransomware incident where the adversary attempted to deploy Rhysida ransomware. While the attack was mitigated in the pre-ransomware stage, we attribute this activity with moderate confidence to Rhysidabased on observed infrastructure that is associated with Rhysida activity and the use of Gootloader, which is commonly leveraged in Rhysida attacks during initial access. Notably, the actors deployed proxy-related DLLs (e.g., “meow_eu.dll”), which we assess were likely related to MeowBackConn, an uncommon backdoor that is closely associated with Gootloader, based on public reporting. 

This attack represents several trends that we observed throughout Talos IR engagements in Q1 2026. The environmental weaknesses that enabled this intrusion — exposed WinRM management ports, over-privileged service accounts, and critical logging gaps — directly echo this quarter’s most prominent security weaknesses, including vulnerable or exposed infrastructure, accounting for 25 percent of engagements. Furthermore, the adversary’s use of Remote Desktop Protocol (RDP) for lateral movement is consistent with RDP being the top technique for lateral movement for the previous two quarters (Q3 and Q4 2025).

Targeting

IR Trends Q1 2026: Phishing reemerges as top initial access vector, as attacks targeting public administration persist

Public administration and health care were tied as the most targeted industry verticals. Notably, Q3 2025 marked the first time public administration emerged as the most targeted sector in Talos IR engagements, and it has retained that position since. Organizations within the public administration sector are attractive targets as they are often underfunded and use legacy equipment. These entities may have access to sensitive data as well as a low downtime tolerance, making them attractive to financially motivated and espionage-focused threat groups.

Initial access

IR Trends Q1 2026: Phishing reemerges as top initial access vector, as attacks targeting public administration persist

Phishing reemerged as the most observed means of gaining initial access, accounting for over a third of the engagements where initial access could be determined. Phishing was the top initial access vector in the first half of 2025, at which point it was surpassed by exploitation of public-facing applications, likely due to the widespread exploitation of vulnerabilities in on-premises Microsoft SharePoint servers, collectively referred to as ToolShell. Since then, we have observeda steady decrease in the exploitation of public-facing applications as an initial access vector from a high of 62 percent to only 18 percent in Q1 2026. Similarly, in this quarter, valid accounts returned to its pre-ToolShell baseline as the second most observed means of gaining initial access, comprising 24 percent of Talos IR engagements. We assess the decline in ToolShell exploitation is likely due to the widespread availability of emergency patches and enhanced security detections, highlighting the importance of timely patching.

Recommendations for addressing top security weaknesses

IR Trends Q1 2026: Phishing reemerges as top initial access vector, as attacks targeting public administration persist

Implement properly configured MFA and other access control solutions  

35 percent of engagements this quarter involved multi-factor authentication (MFA) weaknesses, an increase from last quarter. This includes incidents where threat actors bypassed MFA and where MFA was either missing or only partially enabled, particularly on remote access services. Adversaries were able to bypass MFA by registering new devices to previously compromised accounts, and in one instance, by configuring Outlook clients to connect directly to Exchange servers, circumventing MFA requirements. Addressing these weaknesses, especially by restricting self-service MFA enrollment and enforcing strong, centralized authentication policies, is essential to reducing risk and strengthening organizational resilience. 

Conduct robust patch management   

Vulnerable or exposed infrastructure was another top security weakness accounting for 25 percent of all engagements, a slight decrease from last quarter. This included exploiting a vulnerability (CVE-2025-20393) in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager, as well as a vulnerability (CVE-2023-20198) in the web UI feature in Cisco IOS XE Software. Talos also observed exposed management ports (such as WinRM open to the internet), which enabled rapid attacker movement and reconnaissance.  

Configure centralized logging capabilities across the environment   

Finally, 18 percent of engagements this quarter involved organizations with insufficient logging capabilities, which hindered investigative efforts. Understanding the full context and chain of events performed by an adversary on a targeted host is vital not only for remediation but also for enhancing defenses and addressing any system vulnerabilities for the future. To address this issue, Talos IR recommends organizations implement a security information and event management (SIEM) solution for centralized logging. In the event an adversary deletes or modifies logs on the host, the SIEM will contain the original logs to support a forensics investigation. Additionally, Talos IR offers a Log Architecture Assessment service, which provides a focused review of an organization’s logs and overall log strategy to identify gaps and offer recommendations that give a complete view of the security environment and strengthen incident response readiness 

MITRE ATT&CK appendix 

The tables below represent the MITRE ATT&CK techniques observed in this quarter’s IR engagements and includes relevant examples and the number of times seen. Given that some techniques can fall under multiple tactics, we grouped them under the most relevant tactic based on the way they were leveraged. Please note that this is not an exhaustive list. 

Key findings from the MITRE ATT&CK framework include: 

  • Phishing was the top method of initial access, replacing exploitation of public-facing applications which was dominant in the prior two quarters. 
  • Web-based C2 was the most common C2 pattern. Application Layer Protocol over web protocols was observed most often, indicating adversaries frequently blended C2 into normal-looking traffic. 
  • Lateral movement primarily relied on common remote administration channels. SMB/Windows Admin Shares was the top lateral movement technique, with WMI and RDP also heavily used, suggesting attackers repeatedly leveragedstandard enterprise remote management paths once inside. RDP was the top technique for lateral movement in the prior two quarters.  
  • Defense evasion frequently focused on weakening visibility and endpoint protections. Impair defenses by disabling/modifying tools appeared multiple times, alongside log/trace reduction behaviors (e.g., clear command history and file deletion), indicating a recurring emphasis on reducing detection and forensic evidence.

Tactic 

Technique 

Example 

Estimated times observed  

Reconnaissance 

T1589.002: Gather Victim Identity Information: Email Addresses 

The adversary enumeratedinternal processes and identifiedvendor emails to facilitate their fraudulent ordering scheme. 

1 

 

T1595: Active Scanning 

 

The adversary scanned public-facing websites to understand the target environment. 

2 

 

T1593: Search Open Websites/Domains 

The adversary scanned the web to obtain Github PATs. 

1 

Initial access 

T1566: Phishing 

The adversary used malicious emails and social engineering to compromise user accounts and facilitate fraudulent purchase orders. 

5 

 

T1189: Drive-by compromise 

The adversary registered several domains that masquerade as being related to VMware, and manipulated the SEO to show them at the top when searching for keywords such as VMware 

3 

 

T1078: Valid Accounts 

The adversary successfully gained access to the environment by using compromised user credentials  

4 

 

T1190: Exploit public-facing applications 

Two internet facing Linux servers running Apache and an LMS application were targeted. 

3 

Execution 

T1204.002: User Execution: Malicious File 

The victim downloaded a malicious installer on their personal host, connected the host to their company’s network, transferred the malware to their primary domain controller, then executed the malware.  

3 

 

T1204.001: User Execution: Malicious link  

The victim clicked on a link that led to a fake DocuSign document hosted on adobe[.]com 

5 

 

T1059.001: Command and Scripting Interpreter: PowerShell  

The adversary used PowerShell commands and scripts for execution. 

4 

 

T1059.006: Command and Scripting Interpreter: Python 

The adversary used automated Python scripts to interact with the environment. 

1 

 

T1059.005: Command and Scripting Interpreter: MSHTA 

The adversary attempted to use mshta.exe to retrieve and execute a remote malicious payload from an external URL. 

1 

Persistence 

T1556.006: ModifyAuthentication Process: Multi-Factor Authentication 

The adversary registered their own malicious MFA devices to maintain access to compromised accounts. 

2 

 

T1219: Remote Access Software 

The adversary installed and used AnyDesk for unauthorized remote access. 

1 

 

T1053.005: Scheduled Task/Job: Scheduled Task 

The adversary configured tasks to run on a schedule or at system startup. 

1 

 

T1505: Server Software Component 

The adversary installed malware on breached devices to facilitateremote command execution via HTTP. 

1 

Privilege escalation 

T1068: Exploitation for Privilege Escalation 

The adversary escalated to SYSTEM level privileges, which may have provided access to cached credentials in memory or registry hive. 

1 

 

T1548: Abuse Elevation Control Mechanism 

The adversary used ExecutionPolicy Bypass in PowerShell and attempted to add users to the local Administrators group. 

1 

 

T1078 Valid Accounts 

The adversary bypassed standard access controls by using compromised accounts with existing high-level privileges. 

1 

Defense evasion 

T1070.003: Indicator Removal on Host: Clear Command History 

The adversary used the terminal emulator “ConEmu” to run commands, intentionally avoiding log generation. 

2 

 

T1070.001: Indicator Removal: Clear Windows Event Logs 

The adversary deleted logs on compromised devices to limit forensic findings. 

1 

 

T1556: ModifyAuthentication Process 

The adversary set up an Outlook client Outlook client to connect to the Exchange Server and was able to send messages via that path which bypasses the requirement for MFA via Duo. 

1 

 

T1562.001: Impair Defenses: Disable or Modify Tools 

The adversary was able to uninstall EDR agents from hosts and attempted to delete Windows Defender policies. 

4 

Credential access 

 

T1003.002: OS Credential Dumping: Security Account Manager 

The adversary saved SAM and SYSTEM registry hives to extract local account hashes.  

2 

 

T1003.003: OS Credential Dumping: NTDS  

The adversary dumped the ntds.dit file from Domain Controllers to obtain domain-wide credential hashes. 

1 

 

T1003.005: Cached Domain Credentials  

The adversary gained NT hashes for multiple domain accounts from cached logon information. 

1 

 

T1557: Adversary-in-the-Middle 

The adversary  used an AiTMproxy to capture credentials and session tokens. 

1 

Discovery 

T1087.003: Account Discovery: Email Account 

The adversary used Graph API calls to verify long lists of email addresses and retrieve associated user GUIDs. 

1 

 

T1580: Cloud Infrastructure Discovery  

The adversary performed enumeration of the environment, including gathering OneDrive metadata (drive IDs and child item counts) and user roles. 

1 

 

T1069.002: Permission Groups Discovery: Domain Groups  

The adversary used commands like net group “domain admins” /domain to find high-privilege accounts. 

 

1 

 

T1526: Cloud Service Discovery   

The adversary ran the legitimate cybersecurity tool TruffleHog to discover repositories containingclient secrets and personal information. 

1 

Lateral movement 

T1021.002: Remote Services: SMB/Windows Admin Shares 

The adversary used PsExec(communicated over SMB) to move laterally from the compromised domain controller to other servers. 

4 

 

T1047: Windows Management Instrumentation  

The adversary used PowerShell scripts to leverage WMI (Get-WmiObject) to query remote computers. 

3 

 

T1021.001: Remote Services: Remote Desktop Protocol 

The adversary used RDP connections between hosts. 

3 

Collection 

T1530: Data from Cloud Storage Object  

The analysis of M365 Audit Logs showed multiple FileAccessedand FileDownloaded events for documents stored in SharePoint and OneDrive. 

1 

 

T1040 Network Sniffing 

The adversary executed monitor capture commands on specific interfaces to intercept and capture network traffic. 

1 

Command and control 

T1071.001: Application Layer Protocol: Web Protocols 

The adversary used MeshAgentto communicate with the C2 server over WebSockets. 

5 

 

T1102: Web Service  

The adversary leveraged a Telegram URL to issue instructions and download links.  

1 

 

T1572: Protocol Tunneling 

The adversary used a second-stage script to create an HTTPS tunnel directly to the C2 system. 

1 

 

T1201: Traffic Signaling 

The adversary communicated with external infrastructure using regular beaconing or other signaling patterns to maintain C2 or check in with their C2 server. 

1 

Exfiltration 

T1567.002: Exfiltration Over Web Service 

The adversary accessed and exfiltrated internal data, specifically SharePoint files, via web-based channels. 

1 

 

T1041: Exfiltration Over C2 Channel 

The adversary exfiltrated approximately 2,500 client secrets and personal information. 

2 

Impact 

T1657: Financial Theft 

The adversary used company resources to place orders totaling hundreds of thousands of US dollars for various products which were successfully delivered. 

1 

 

T1486 Data Encrypted for Impact 

The adversary encrypted victim data. 

1 

 

T1531 Account Access Removal 

The adversary disabled admin accounts and deleted service accounts in the Active Directory (AD) and Azure 

1 

Software 

Rhysida  

A RaaS, known for posing as a cybersecurity team that “helps” its victims identify security weaknesses in their networks. 

Pre-ransomware engagement 

 

SocGholish 

A JavaScript-based loader malware that has been used since at least 2017, primarily for initial access.  

1 

 

Money Message 

A ransomware that emerged in March 2023, and is capable of targeting Windows and Linux systems (including VMware ESXiservers). 

Pre-ransomware engagement 

Cisco Talos Blog – ​Read More

I’m putting Motorola above Samsung when it comes to flip phones – and won’t think twice

Here’s why Motorola owns half the US foldable market, despite competition from Samsung and Google.

Latest news – ​Read More

I saw Framework’s new ‘MacBook Pro for Linux users’ and it may entice Windows fans, too

Years of user feedback have led to the new Framework Laptop 13 Pro, an ultraportable device that’s both modular and premium.

Latest news – ​Read More