Oct. 30, 2023, 1:03 p.m. | /u/TheDFIRReport

For [Blue|Purple] Teams in Cyber Defence www.reddit.com

This intrusion began with an email delivered with a zip file containing a malicious Javascript file. Following email delivery, a user extracted and executed the Javascript file. The JavaScript code pulled down an obfuscated PowerShell script that was run in memory. The PowerShell script was responsible for deploying NetSupport onto the system along with ensuring the script was not running in a sandbox and establishing persistence using registry run keys.


https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/

blueteamsec code compromise delivery domain down email file intrusion javascript malicious memory netsupport obfuscated powershell powershell script pulled responsible results run script system zip

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cloud Security Engineer

@ Gainwell Technologies | Any city, OR, US, 99999

Federal Workday Security Lead

@ Accenture Federal Services | Arlington, VA

Workplace Consultant

@ Solvinity | Den Bosch, Noord-Brabant, Nederland

SrMgr-Global Information Security - Security Risk Management

@ Marriott International | Bethesda, MD, United States

Sr. Security Engineer - Data Loss Prevention

@ Verisk | Jersey City, NJ, United States