138. Hunting for File Transfer Sites Access
Hello everyone!
Adversaries often abuse legitimate file transfer sites, both for data exfiltration and ingress tool transfer. For example, Scattered Spider (Muddled Libra, 0ktapus, Scatter Swine, UNC3944).
According to Unit42 report, the threat actors leveraged the following file transfer sites: put[.]io, transfer[.]sh, wasabi[.]com, gofile[.]io.
As always, we can use it to build our hunting query, for example:
event_type: dnsreq*
AND
dns_rname: ("put.io" OR "transfer.sh" OR "wasabi.com" OR "gofile.io")
See you tomorrow!
Comments
Post a Comment