Tech, tools, thoughts from the team at Lab539
Lab539::Blog
Self Hosted Conditional Access Service
Creating a self hosted Azure Logic App to periodically query the Lab539 AiTM API and update a named location - allowing you to have real time updated conditional access policies.
File Hosting Services Used for Identity Phishing
Which file hosting provider is really being impersonated the most in the file hosting attacks that Microsoft disclosed recently?
AiTM Feed - Conditional Access
Guide to setting up the conditional access named location feed for the Lab539 AiTM service.
Using Conditional Access Policies to Block Tor Exit Nodes in Entra ID
Information on how to create a conditional access policy in Microsoft Entra ID that blocks access from a list of IP’s - in this case a list of Tor IPs
A Summary of 6 Months Tracking AiTM Campaigns
This post is a summary of 6 months tracking AiTM campaigns using a rather clever technique we have devised that allows us to identify the backend infrastructure before it is used.
The Cyber Defenders Kill Chain (TCDO Part2)
The cyber defenders kill chain emphasises the different stages of an attack in a manner relevant to defenders. It’s central to how we, at Lab539, craft effective tailored cyber defences that protect critical functions.
Applying Context, Controlling Adversaries (TCDO Part 1)
Adversarial tradecraft is not rigid, it can and does evolve. Spending more time studying adversaries is not unhelpful but we much prefer to keep things on our own terms, to control how adversaries must operate, and the tradecraft they must use. This is the first of a series of posts on our thinking and how we look at things a little differently in order to achieve that elusive feeling of confidence in our defences.
Cyber Security, Fuel Terminals and Operational Networks
The cyber threat to the oil and gas sector is very real. We take a look at some recent incidents and provide some guidance to those defending OT networks.
Inside Akira Ransomware Negotiations
Lab539 delved into the negotiations which the Akira ransomware group conduct with their victims in order to provide and share some insights.
Report leaked payment cards
Found credit card numbers online, then use leaked.cards report them safely and securely.
Linux Malware Detection with LimaCharlie
Free LimaCharlie lookup for known Linux malware hashes pulled from various sources including the Lab539 sensor network.