Aug. 28, 2023, 3:18 p.m. | /u/TheDFIRReport

cybersecurity www.reddit.com

In this case a threat actor delivered a password protected ZIP file via HTML smuggling. Within the password protected ZIP file, there was an ISO file that deployed IcedID which led to the use of Cobalt Strike. Nokoyawa ransomware was deployed domain wide within 12 hours of initial access.



Report: https://thedfirreport.com/2023/08/28/html-smuggling-leads-to-domain-wide-ransomware/

access actor case cobalt cobalt strike cybersecurity domain file html html smuggling icedid initial access iso led nokoyawa nokoyawa ransomware password ransomware smuggling strike threat threat actor zip

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

DevSecOps Engineer

@ LinQuest | Beavercreek, Ohio, United States

Senior Developer, Vulnerability Collections (Contractor)

@ SecurityScorecard | Remote (Turkey or Latin America)

Cyber Security Intern 03416 NWSOL

@ North Wind Group | RICHLAND, WA

Senior Cybersecurity Process Engineer

@ Peraton | Fort Meade, MD, United States

Sr. Manager, Cybersecurity and Info Security

@ AESC | Smyrna, TN 37167, Smyrna, TN, US | Santa Clara, CA 95054, Santa Clara, CA, US | Florence, SC 29501, Florence, SC, US | Bowling Green, KY 42101, Bowling Green, KY, US