Weekly Cybersecurity Wrap-up 5/29/23

It was a short week this week, missing Monday in the US. If you are new here, every week I publish a post containing the progress and learning that I did in the past week. The short week made it more difficult to fit in webinars and podcast, but I have a fun webinar set up for next week!

Articles

Projects

TryHackMe – SOC Level 1 – Network Miner – Completed.

Weekly Cybersecurity Wrap-up 5/22/23

Every week I publish a post containing the progress and learning that I did in the past week. Again, no podcasts or webinars. I have been very busy at work and I have not had the time to fit them into my schedule.

Webinars

  • No webinars this week.

Articles

Podcasts

  • No podcasts this week.

Projects

  • TryHackMe – SOC Level 1 – Snort Challenge – Live Attacks completed!

Weekly Cybersecurity Wrap-up 5/15/23

Every week I publish a post containing the progress and learning that I did in the past week. I’m so far behind on podcasts at this point I’m not sure I’ll ever catch up! Also, I had meetings conflict with the scheduled webinars I wanted to attend so I hope to have time to watch the replays later.

Webinars

  • No webinars this week.

Articles

Podcasts

  • No podcasts this week.

Projects

TryHackMe – SOC Level 1 – Snort Challenge – The Basics completed!

Weekly Cybersecurity Wrap-up 5/8/23

Every week I publish a post containing the progress and learning that I did in the past week. Still no podcasts this week. I really have to find some time to fit those in! I miss them!

Webinars

  • SANS – 2023 Report: Digital Forensics – 5/10/23 – This webcast aims to dissect some of these disciplines and get a feel from the experts why they chose their specific field and what it takes to thrive as a practitioner in niche forensic fields.

Articles

Podcasts

  • No podcasts this week.

Projects

TryHackMe – Completed the first Snort room in the SOC Analyst training path.

Weekly Cybersecurity Wrap-up 5/1/23

Every week I publish a post containing the progress and learning that I did in the past week. I was sick this week, but still made some good progress.

Webinars

Articles

Podcasts

  • No time for podcasts this week.

Projects

  • New Term: Malverposting refers to the use of promoted social media posts on services like Facebook and Twitter to mass propagate malicious software and other security threats. The idea is to reach a broader audience by paying for ads to “amplify” their posts.
  • Splunk Training: Completed “Working with Time”
  • Installed Splunk on Ubuntu VM and uploaded data to Splunk
  • LinkedIn – Learning VirtualBox

Splunk

One of the goals I have set myself is becoming core user certified for splunk. I’ve already begun taking the classes, but I found them a bit lacking and I’m someone who learns best by doing so I decided to install a Ubuntu VM and get Splunk up and running on it. It was simpler than I thought. Here is how I did it.

I followed this video for the install
Downloading Splunk
Downloading Splunk

I followed this great youtube video that is only 5 minutes long! I know! Insane. It really is not that difficult. The image above shows the download.

Successful Installation
Successful Installation

You set up the username and password for Splunk during the installation that happens in terminal.

Installing Data
Installing Data

In order to actually do anything with Splunk you need data to query. So I followed these instructions on splunks site.

They were okay but I ran into an issue where the upload kept timing out, so I found this troubleshooting guide also on their support site. How to resolve error “Upload failed with ERROR : Read Timeout for the log file” when uploading a generated alert log to Splunk?

These instructions worked like a charm!

Querying Splunk
Querying Splunk

And lastly, I was able to query Splunk successfully. Now, I can go back through the training on Splunk’s site and do the examples at the same time as the online instructors. I’m very happy this was easier than I thought.

Weekly Cybersecurity Wrap-up 4/23/23

This is my weekly post containing the progress and learning that I worked on in the past week. Most of my week was spent working on internal training that my company offers. So less listed here this week.

Webinars

  • None this week.

Articles

  • Hackers can breach networks using data on resold corporate routers – Enterprise-level network equipment on the secondary market hide sensitive data that hackers could use to breach corporate environments or to obtain customer information.
  • Decoy Dog malware toolkit found after analyzing 70 billion DNS queries – Decoy Dog helps threat actors evade standard detection methods through strategic domain aging and DNS query dribbling, aiming to establish a good reputation with security vendors before switching to facilitating cybercrime operations.
  • Google ads push BumbleBee malware used by ransomware gangs – Bumblebee is a malware loader discovered in April 2022, thought to have been developed by the Conti team as a replacement for the BazarLoader backdoor, used for gaining initial access to networks and conducting ransomware attacks.
  • Lazarus X_TRADER Hack Impacts Critical Infrastructure Beyond 3CX Breach – Lazarus, the prolific North Korean hacking group behind the cascading supply chain attack targeting 3CX, also breached two critical infrastructure organizations in the power and energy sector and two other businesses involved in financial trading using the trojanized X_TRADER application.
  • TP-Link Archer WiFi router flaw exploited by Mirai malware – The Mirai malware botnet is actively exploiting a TP-Link Archer A21 (AX1800) WiFi router vulnerability tracked as CVE-2023-1389 to incorporate devices into DDoS (distributed denial of service) swarms.
  • Hackers are breaking into AT&T email accounts to steal cryptocurrency – AT&T says cyber criminals exploited an API issue to take control of victims’ email addresses
  • Hackers Leaked Minneapolis Students’ Psychological Reports, Allegations of Abuse – In a hacking episode that is spiraling from bad to worse, cyber criminals have leaked highly sensitive documents related to droves of Minneapolis students.
  • Ukrainian arrested for selling data of 300M people to Russians – The Ukrainian cyber police have arrested a 36-year-old man from the city of Netishyn for selling the personal data and sensitive information of over 300 million people, citizens of Ukraine, and various European countries.
  • New Atomic macOS Malware Steals Keychain Passwords and Crypto Wallets – Threat actors are advertising a new information stealer for the Apple macOS operating system called Atomic macOS Stealer (or AMOS) on Telegram for $1,000 per month, joining the likes of MacStealer.
  • Major UK banks including Lloyds, Halifax, TSB hit by outages – Websites and mobile apps of Lloyds Bank, Halifax, TSB Bank, and Bank of Scotland have experienced web and mobile app outages today leaving customers unable to access their account balances and information.
  • Israel’s Prime Minister has his Facebook account hijacked, website knocked offline – the Facebook account of Israel’s Prime Minister was hijacked (albeit briefly) by unauthorized parties who managed to update it with a video of prayers at a mosque, accompanied by Arabic verses from the Quran.

Podcasts

Projects

  • TryHackMe – SOC Level 1 – Network Security and Traffic Analysis – I started working in the Snort room this week.