Adversary Tradecraft
Threats I've detected and responded to in the field. MITRE ATT&CK mapped. Click into each for the full breakdown.
Malicious DNS Callback
High
Suspicious DNS request to a known-bad domain from an endpoint running an unsigned binary. Traced through full process chain.
View full analysis →C2 Network Activity
High
Python payload making outbound HTTP connections to attacker infrastructure. Triggered by a malicious package install.
View full analysis →Persistence via Scheduled Task
MediumAttacker established persistence using schtasks to execute a beacon payload on restart. Identified through scheduled task audit.
Placeholder - Replace with real detection
DNS Tunneling Exfiltration
MediumAnomalous DNS query volume to a newly registered domain. Base64-encoded data in subdomain queries consistent with DNS tunneling.
Placeholder - Replace with real detection