(Strategies for Threat Awareness and Response) webinar and blog series
Co-author: Samantha Gardener
To stay ahead of today’s sophisticated cyber threats, organizations must embrace a proactive defense strategy that includes these three pillars: emerging trends, adaptive strategies, and actionable insights.
Threat actors are increasingly leveraging AI-driven attacks, supply chain compromises, and identity-based exploits. Modern strategies focus on zero trust principles, continuous threat hunting, and leveraging advanced threat intelligence to predict and neutralize risks before they escalate. By integrating real-time analytics, automated response capabilities, and cross-platform visibility, security teams can transform insights into decisive action to help ensure resilience against evolving attack vectors and safeguard critical assets in an ever-changing landscape
Our popular S.T.A.R. webinar series features panels of our experts who discuss trends, strategies, and insights that will help you defend against today’s sophisticated threats.
- Gain Expert Insights: Learn from Microsoft Defender Experts who share their knowledge on the latest threats and trends in cybersecurity.
- Bolster their Security Program: Receive actionable guidance and strategies to effectively combat emerging threats and strengthen defenses.
- Meet the Experts: Get to know the Defender Experts and understand their roles in safeguarding organizations.
For additional insights, some episodes are accompanied by informative blogs that include even include real-world threat hunting patterns
Microsoft Defender Experts - S.T.A.R. series episodes
Episode 1 - November 2024
Crafting Chaos: The Amplified Tactics of Social Engineering - Hunt, Halt, and Evict
Description
Explore amplified tactics of social engineering with our Defender Experts. We cover Quick Assist email spam floods, RMM tool abuse, and the ClickFix Powershell copy/paste technique. We highlight how attackers leverage legitimate services like SharePoint, Dropbox, and Google Drive for phishing campaigns.
Key Topics:
- Quick Assist Email Spam Flood: Abusing QuickAssist to gain initial access and deploy ransomware.
- RMM Tools: Increased abuse of RMM tools for delivering trojans or infostealers.
- ClickFix Powershell Copy/Paste: Users tricked into copying and pasting malicious code.
- Abuse of File Hosting Platforms: Using legitimate services for phishing campaigns.
- Advanced Hunting Queries: KQL queries for detecting suspicious activities.
Video Link
Episode 1 - Crafting Chaos: The Amplified Tactics of Social Engineering - Hunt, Halt, and Evict
Episode 2 - February 2025
Rise of Infostealers, ClickFix, and More
Description
Delve into the latest threat landscape, featuring notorious actors like Hazel Sandstorm, Sangria Tempest, and Midnight Blizzard. Understand the insidious ClickFix technique, a social engineering marvel that exploits users' natural tendencies to click prompts and buttons. Learn more about the growing trend of renamed binaries and how adversaries are using them to evade detection.
Key Topics:
- Infostealers Unveiled: Functions and examples of infostealers like LummaStealer, DarkGate, and DanaBot.
- ClickFix Technique: Combining phishing, malvertising, and malicious scripting.
- Identity Compromise: Techniques like AiTM, BiTM, and BiTB attacks.
- Advanced Hunting Queries: KQL queries for detecting suspicious activities
Video Link
Episode 2 - Rise of Infostealers, ClickFix, and More
Episode 3 - June 2025
The Case Against ClickFix
Description
Deep dive into the ClickFix technique, a rising social engineering threat that manipulates users into executing malicious scripts through fake prompts like CAPTCHA verifications.
Key Topics
- How adversaries are leveraging ClickFix to deploy infostealers, remote access tools, and loaders, while also evading detection through renamed binaries and obfuscated scripting.
Technique:
- ClickFix combines phishing, malvertising, and drive-by compromises with fake CAPTCHA overlays. Users are tricked into copying and executing malicious commands via the Windows Run dialog.
Compromise:
- ClickFix mimics identity compromise tactics by hijacking user trust, using spoofed interfaces, clipboard hijacking, and executing obfuscated scripts via LOLBins like PowerShell, mshta, and rundll32.
Advanced Hunting Queries (AHQs):
- Suspicious RunMRU registry entries.
- Use of LOLBins and obfuscated PowerShell commands.
- Indicators such as shortened URLs, fake CAPTCHA text, and encoded payloads.
Video Link
Episode 3 - The Case Against ClickFix
Episode 4 - Aug 2025
Post-Breach Browsers: The Hidden Threat You’re Overlooking
Description
Modern browsers aren’t just attack entry points; they’re post-breach goldmines. In this episode, Microsoft Defender Experts are joined by JBO, the architect behind cross-platform research at Microsoft Defender and a leading voice in offensive security, exploitation, and vulnerability research.
Key Topics:
- Post-Breach Tradecraft
How adversaries weaponize browser memory, debugging ports, and extensions to maintain access and evade detection. - Detection That Cuts Through the Noise
Spot stealthy abuse: anomalous COM calls, rogue child processes, TLS key leaks, and more. - Expert-Led Defense
JBO and the Defender Experts team bring real-world insights from the frontlines, including techniques used to uncover and mitigate browser-based threats across Windows, macOS, and Linux.
If you think browser security ends at patching, think again. This episode is your essential guide to defending against the post-breach browser threatscape.
Video Link
Episode 4 - Post-Breach Browsers: The Hidden Threat You’re Overlooking
Learn more – read the blog
Post-breach browser abuse: a new frontier for threat actors | Microsoft Community Hub
Modern browsers are among the most complex and trusted applications on any endpoint. While they are often discussed in the context of initial access (through phishing, drive-by downloads, or zero-day exploits) this post focuses on a less explored but increasingly relevant threat vector: post-breach browser abuse.
Episode 5 – October 2025
TCC You Later: Spotlights Metadata Mischief in macOS
Description
Threat actors are exploiting overlooked macOS features. Join our experts as they discuss trends, strategies, and insights that will help you defend against this new attack vector.
Key Topics:
- Understand how AI features and Spotlight indexing expose sensitive metadata, while weaknesses in TCC controls increase exploitation potential.
- Learn how unsigned Spotlight plugins can bypass privacy safeguards, granting access to confidential files and Apple Intelligence data.
- Defend better by strengthening detection for anomalous Spotlight activity, enforce patching, and manage updates through Intune for proactive defense.
Video Link
Episode 5 - TCC You Later: Spotlights Metadata Mischief in macOS
Learn more – read the blog
The invisible attack surface: hunting AI threats in Defender XDR | Microsoft Community Hub
As organizations embed AI across their business, the same technology that drives productivity also introduces a new class of risk: prompts that can be manipulated, data that can be leaked, and AI systems that can be tricked into doing things they shouldn’t. Attackers are already testing these boundaries, and defenders need visibility into how AI is being used - not just where it’s deployed.