138. Hunting for File Transfer Sites Access

Hello everyone!

Adversaries often abuse legitimate file transfer sites, both for data exfiltration and ingress tool transfer. For example, Scattered Spider (Muddled Libra, 0ktapus, Scatter Swine, UNC3944).

According to Unit42 report, the threat actors leveraged the following file transfer sites: put[.]io, transfer[.]sh, wasabi[.]com, gofile[.]io.

As always, we can use it to build our hunting query, for example:

event_type: dnsreq*

AND

dns_rname: ("put.io" OR "transfer.sh" OR "wasabi.com" OR "gofile.io")

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge