WEBINAR | From Deal to Defense: Unifying Cybersecurity Post-M&A
Reduce Alert Noise and False Positives
Boost your team's productivity by cutting down alert noise and false positives.
Automate Security Operations
Boost efficiency, reduce burnout, and better manage risk through automation.
Dark Web Monitoring
Online protection tuned to the need of your business.
Maximize Existing Security Investments
Improve efficiencies from existing investments in security tools.
Move your security operations beyond the limitations of MDR.
Secure with Microsoft 365 E5
Boost the power of Microsoft 365 E5 security.
Secure Multi-Cloud Environments
Improve cloud security and overcome complexity across multi-cloud environments.
Secure Mergers and Acquisitions
Control cyber risk for business acquisitions and dispersed business units.
Solve security operations challenges affecting critical operational technology (OT) infrastructure.
Force-Multiply Your Security Operations
Whether you’re just starting your security journey, need to up your game, or you’re not happy with an existing service, we can help you to achieve your security goals.
Detection Investigation Response
Modernize Detection, Investigation, Response with a Security Operations Platform.
Locate and eliminate lurking threats with ReliaQuest GreyMatter
Find cyber threats that have evaded your defenses.
Security metrics to manage and improve security operations.
Breach and Attack Simulation
GreyMatter Verify is ReliaQuest’s automated breach and attack simulation capability.
Digital Risk Protection
Continuous monitoring of open, deep, and dark web sources to identify threats.
GreyMatter Phishing Analyzer removes the abuse mailbox management by automating the DIR process for you.
The GreyMatter cloud-native Open XDR platform integrates with a fast-growing number of market-leading technologies.
Unify and Optimize Your Security Operations
ReliaQuest GreyMatter is a security operations platform built on an open XDR architecture and designed to help security teams increase visibility, reduce complexity, and manage risk across their security tools, including on-premises, clouds, networks, and endpoints.
Brands of the world trust ReliaQuest to achieve their security goals.
Learn how to achieve your security outcomes faster with ReliaQuest GreyMatter.
The latest security trends and perspectives to help inform your security operations.
Industry Guides and Reports
The latest security research and industry reports.
Catch up on the latest cybersecurity podcasts, and mindset moments from our very own mental performance coaches.
A deep dive on how ReliaQuest GreyMatter addresses security challenges.
The latest white papers focused on security operations strategy, technology & insight.
Current and future SOC trends presented by our security experts.
Events & Webinars
Explore all upcoming company events, in-person and on-demand webinars
From prevention techniques to emerging security trends, our comprehensive library can arm you with the tools you need to improve your security posture.
Get the latest threat analysis from the ReliaQuest Threat Research Team. ReliaQuest ShadowTalk Weekly podcast featuring discussions on the latest cybersecurity news and threat research.
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories.
February 20, 2024
We bring our best attitude, energy and effort to everything we do, every day, to make security possible.
Security is a team sport.
No Show Dogs Podcast
Mental Performance Coaches Derin McMains and Dr. Nicole Detling interview world-class performers across multiple industries.
Make It Possible
Make It Possible reflects our focus on bringing cybersecurity awareness to our communities and enabling the next generation of cybersecurity professionals.
Join our world-class team.
Press and Media Coverage
ReliaQuest newsroom covering the latest press release and media coverage.
Become a Channel Partner
When you partner with ReliaQuest, you help deliver world-class cybersecurity solutions.
How can we help you?
A Mindset Like No Other in the Industry
Many companies tout their cultures; at ReliaQuest, we share a mindset. We focus on four values every day to make security possible: being accountable, helpful, adaptable, and focused. These values drive development of our platform, relationships with our customers and partners, and further the ReliaQuest promise of security confidence across our customers and our own teams.
The ReliaQuest Photon Threat Research team has been investigating phishing attempts from the Initial Access Broker (IAB) “Exotic Lily” (also known as PROJECTOR LIBRA, TA580). IABs sell access to compromised networks, and this threat actor quickly achieved notoriety through their ties with ransomware groups such as “Conti” and “Diavol.” Exotic Lily specializes in gathering credentials from high-value targets through employee impersonation, deep open-source intelligence (OSINT), and by creating convincing malicious documents. Recently, the Photon team investigated an attack targeting one of our client’s high-ranking employees.
Exotic Lily has become particularly prevalent and successful due to the high level of detail they apply to their phishing campaigns. This has been seen repeatedly through a tried-and-tested path that typically begins with an open conversation to the victim, sourced from a fabricated business profile. These profiles then exploit this implied sense of trust to lure victims into navigating to seemingly benign sites to download malicious payloads.
The attack investigated by ReliaQuest started with an email sent to a profiled victim in the same business industry. The email in question sourced from what appeared to be a potential business prospect. Exotic Lily accomplished this by spoofing the domain of the legitimate organization they were posing as. In this case, the only difference between the legitimate organization (ex. company.com) and the spoofed company domain (ex. company.co) was the top-level domain (TLD).
In hindsight, you may think, “I would never fall for this,” but it’s important to show the victim empathy. Often, searching on the site company.co will lead the user to the legitimate site of company.com. This strengthens a false sense of trust between the threat actor and victim.
Once email communications are established, the threat actor is ready to move into the next stage of attack and deliver the malicious email. This is achieved typically by the group hosting a malicious zip file on a well-known filesharing platform (i.e., TransferNow, TransferXL, WeTransfer, OneDrive.) Next, this file is shared with the victim and an email is sent from the filesharing platform; because these emails originate from legitimate domains, they often make it into the victim’s inbox. After the victim has downloaded the zip file and extracted the contents, an ISO or IMG filetype is downloaded to the victim’s computer; ISO and IMG file types are used to clone the entire contents of a system disk.
Now, the user must interact and mount either the IMG or ISO file, which will often contain an LNK file; this refers to a Windows Shortcut that serves as a pointer to open a file, folder, or application. Exotic Lily has been known to use Windows shortcuts to deploy the loader “BumbleBee”; loaders are used to load malicious content on the victim’s asset.
Recently though, the Photon Threat Research team investigated a unique case where a Python interpreter and Python-based loader were used instead of BumbleBee. When the user interacted with this LNK file, the packaged Python was executed, and a Cobalt Strike Beacon was loaded onto the victim’s machine. Shortly after, the beacon established a C2 channel and host enumeration began. This activity was short-lived, as the host was contained at this point.
When a threat group such as Exotic Lily is targeting your company, it’s going to put your current security posture to the test. The level of expertise this IAB has is evident in each case the ReliaQuest Photon team investigates—such as deploying a Python interpreter and script to deploy a Cobalt Strike Beacon.
The GreyMatter Phishing Analyzer will help improve your security team’s response time to user-reported phishing attacks. When such emails are reported, the Phishing Analyzer places key email artifacts under heavy scrutiny in the abuse mailbox. When a malicious verdict is reached, runbooks are performed to contain and mitigate the risk. Heightened user awareness combined with the GreyMatter Phishing Analyzer will prevent threat actors such as Exotic Lily from successfully phishing your end users. This frees up your security team from focusing on the manual efforts of a phishing investigation.
To learn more about the GreyMatter Phishing Analyzer, register for our webinar on March 22, 2023.