Between April 24 and May 1, 2024, Blackpoint’s Active Security Operations Center (Active-SOC) responded to 177 total incidents. These incidents included 27 on-premises Managed Detection Response and Remediation (MDR+R) incidents, 144 Cloud Response for Microsoft 365 incidents, and six (6) Cloud Response for Google Workspace, with confirmed or likely threat actor use of:
- Social engineering and PowerShell scripts by Sangria Tempest for initial access and attempted ransomware deployment
- SocGholish’s use of ActiveX for establishing connections to threat actor-controlled endpoints
- BITS download and double file extension name masking for execution and discovery, with additional malicious inbox rules
In this blog, we’ll dive into the details behind these select incidents, including why they’re important for partners to account for today – even if they’ve not been attacked yet! – as well as possible mitigations leveraging your current tech stack and Blackpoint Cyber.