As always, thanks to those who give a little back for their support!
FORENSIC ANALYSIS
- Jessica Hyde at Hexordia
Mobile Forensic Images and Acquisition Priorities - Belkasoft
Android WhatsApp Forensics. Part I: Acquisition - Cyber 5W
Chromium based browsers Investigation - Cyber Triage
Windows Scheduled Tasks for DFIR Investigations - Hendrik Eckardt at cyber.wtf
Recovering data from broken appliance VMDKs - Dark Data Discovery
Data Carving vs File Carving vs Disk Carving - Doug Metz at Magnet Forensics
Comae Memory and Network Analysis: Beginning an Incident Investigation - Forensafe
Investigating iOS SMS - Zawadi Done and Francisco Dominguez at Hunt & Hackett
Parsing Atop log files with Dissect - Ian Whiffin at DoubleBlak
Apple Maps – Visited Location? - Eden Elazar at Palo Alto Networks
Navigating the Cloud: Exploring Lateral Movement Techniques - Lee Jun Hyeong at Plainbit
How to decrypt malware in MS Defender Quarantine from Forensic image files - Salvation DATA
- Chad Tilbury at SANS
Google Chrome Platform Notification Analysis - Scott Koenig at ‘The Forensic Scooter’
Update to Shared with You Syndication Media & Conversation Correlation - The DFIR Report
SEO Poisoning to Domain Control: The Gootloader Saga Continues
THREAT INTELLIGENCE/HUNTING
- Bill Stearns at Active Countermeasures
Remote Packet Capture - Adam at Hexacorn
- Agari
O365 Volume Up in Q4 as Cybercriminals Target Brands in Credential Theft Attacks - Dean Houari at Akamai
Learning from the LockBit Takedown - AttackIQ
- Avertium
Everything You Need to Know About the Data Extortion Group, Snatch - Dave Addison at BadOosb
- Bitdefender
- Joff Thyer at Black Hills Information Security
Initial Access Operations Part 2: Offensive DevOps - Amanda Berlin at Blumira
Real-World Examples of Detecting Attacks with Sysmon - Cado Security
- Himaja Motheram at Censys
ConnectWise ScreenConnect – CVE-2024-1709 & CVE-2024-1708 - CERT Ukraine
- CERT-AGID
Sintesi riepilogativa delle campagne malevole nella settimana del 24 Febbraio – 1 Marzo 2024 - Check Point
- CISA
- SVR Cyber Actors Adapt Tactics for Initial Cloud Access
- CISA, FBI, and HHS Release an Update to #StopRansomware Advisory on ALPHV Blackcat
- CISA and Partners Release Advisory on Threat Actors Exploiting Ivanti Connect Secure and Policy Secure Gateways Vulnerabilities
- #StopRansomware: Phobos Ransomware
- Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways
- Fabian Bader at Cloudbrothers
Protect your users from Device Code Flow abuse - Allen Marin at Corelight
Confronting Persistence Techniques | Corelight - CTF导航
AsukaStealer:新型信息窃取恶意软件的分析 - Cyble
- Vulnerable Fortinet Devices: Low-hanging Fruit for Threat Actors
- AsukaStealer, a Revamped Version of the ObserverStealer, Advertised as Malware-as-a-Service
- Ongoing Phishing Campaign Targets Healthcare and Cryptocurrency Users via ScreenConnect
- Cyble Chronicles – March 1st, 2024: Latest Findings & Recommendations for the Cybersecurity Community
- Cyfirma
Weekly Intelligence Report – 01 Mar 2024 - DomainTools
- Elastic Security Labs
Ransomware in the honeypot: how we capture keys with sticky canary files - Ervin Zubic
Are You Overlooking These 6 Questions in Your Intelligence Analysis? - Esentire
- FBI
Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations - Fortinet
- g0njxa
Profiling Трафферы: An introduction to Traffers Teams - Nati Tal and Oleg Zaytsev at Guardio
“SubdoMailing” — Thousands of Hijacked Major-Brand Subdomains Found Bombarding Users With Millions… - Harfanglab
A Comprehensive Analysis Of I-soon’s Commercial Offering - Huntress
- Michael Zuckerman at Infoblox
The 2024 Healthcare Cyber Trend Research Report - Nick Chalard at InQuest
Tools of the (Illegitimate) Trade: Mock API - Intel-Ops
TA577 phishing campaign uses NTLMv2 handshakes to steal user credentials/hashes. - David Cohen at JFrog
Data Scientists Targeted by Malicious Hugging Face ML Models with Silent Backdoor - KELA Cyber Threat Intelligence
Russia-Ukraine war: pro-Russian hacktivist activity two years on - Bert-Jan Pals at KQL Query
Detecting Post-Exploitation Behaviour - Mandiant
- Rémi Pointel at MISP
HarfangLab Use-Case with MISP - Monty Security
Hunting Cobalt Strike LNK Loaders - Michael Dereviashkin at Morphisec
Unveiling UAC-0184: The Steganography Saga of the IDAT Loader Delivering Remcos RAT to a Ukraine Entity in Finland - Nasreddine Bencherchali
SigmaHQ Rules Release Highlights — r2024–02–26 - Orange Cyberdefense
Mail in the Middle – A tool to automate spear phishing campaigns - Ovi Liber
RE:archive | APT37’s ROKRAT HWP Object Linking and Embedding - Palo Alto Networks
Today’s Attack Trends — Unit 42 Incident Response Report - Prodaft
Combating Insider Threats – Detection, Prevention, and Implementation - Matthew Green at Rapid7
How To Hunt For UEFI Malware Using Velociraptor - Ben Webb at Recon Infosec
The Lockbit Ransomware Group Disruption: Now What? - Recorded Future
Predator Spyware Operators Rebuild Multi-Tier Infrastructure to Target Mobile Devices - Red Alert
Monthly Threat Actor Group Intelligence Report, December 2023 (ENG) - ReliaQuest
Browser Credential Dumping - Robin Dimyan
Geopolitical Cyber Risk: Cyber Operations in Modern Warfare - SANS Internet Storm Center
- Utilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary], (Sun, Feb 25th)
- Take Downs and the Rest of Us: Do they matter?, (Tue, Feb 27th)
- Exploit Attempts for Unknown Password Reset Vulnerability, (Wed, Feb 28th)
- [Guest Diary] Dissecting DarkGate: Modular Malware Delivery and Persistence as a Service., (Thu, Feb 29th)
- Scanning for Confluence CVE-2022-26134, (Fri, Mar 1st)
- Marc Brown at Scythe
Adversarial Emulation’s Role as Transformative Agent in Cyber Insurance - Securelist
The mobile malware threat landscape in 2023 - D. Iuzvyk, T. Peck, and O. Kolesnikov at Securonix
Securonix Threat Research Knowledge Sharing Series: Batch (DOS) Obfuscation or DOSfuscation: Why It’s on the Rise, and How Attackers are Hiding in Obscurity - Sekoia
- SentinelOne
- Simone Kraus
Demystification 8Base- Threat Hunting and Detection Opportunities - SOCRadar
- Splunk
- Ben Martin at Sucuri
New Wave of SocGholish Infections Impersonates WordPress Plugins - Nigel Douglas at Sysdig
Container Drift Detection with Falco - System Weakness
- Teri Radichel
How A Crash Dump Can Be An Indication of Malware - Trend Micro
- Edwin David at TrustedSec
Weaponization of Token Theft – A Red Team Perspective
UPCOMING EVENTS
- Black Hills Information Security
Fun with Office Macros w/ David Fletcher - Christa Miller at DFRWS
Two Keynote Speakers and 8 Workshops Headline the DFRWS EU 2024 Conference
PRESENTATIONS/PODCASTS
- Alexis Brignoni
Digital Forensics Now Podcast – Episode 13 - Anuj Soni
Decode Malware Strings with Conditional Breakpoints - Black Hat
Lessons Learned from the KA-SAT Cyberattack: Response, Mitigation and Information Sharing - Black Hills Information Security
- BlueMonkey 4n6
Windows Shortcuts tricks you may not know – especially for Digital Forensics and Incident Response - Breaking Badness
Breaking Badness Cybersecurity Podcast – 180. I-Sooner or Later - Cellebrite
How to Export Files from Cellebrite Inseyets Powered by PA? - CYBERWOX
Redline InfoStealer Malware Analysis: Dynamic Analysis with Wireshark & ANY.RUN - Digital Forensic Survival Podcast
DFSP # 419 – What the Flux - Hacker Valley Blue
Types of Attack Surfaces - Hardly Adequate
Hardly a Week 8 February 27, 2024 - Hasherezade
PE-sieve/HollowsHunter with custom signatures (SigFinder) - InfoSec_Bret
Challenge – PCAP Analysis - John Hammond
- Lee Whitfield at MacAdemia
- Magnet Forensics
- Microsoft Threat Intelligence Podcast
Throwing Darts in the Dark With Microsoft Incident Response - Mostafa Yahia
DFIR (Windows Forensics) Course: Collecting system info from Registry hives - MSAB
Automating Python Scripts in XRY - MyDFIR
- Paraben Corporation
- Richard Davis at 13Cubed
Where’s the 4624? – Logon Events vs. Account Logons - SalvationData
Professional Smartphone Forensics Tools – SPF Pro - Sandfly Security
Sandfly Agentless Linux Security Quickstart - SANS
MALWARE
- Any.Run
DCRat: Step-by-Step Analysis in ANY.RUN - Arda Büyükkaya
Unpacking RC4 Encrypted Malware – REvil ransomware - ASEC
- Jan Vojtěšek at Avast Threat Labs
Lazarus and the FudModule Rootkit: Beyond BYOVD with an Admin-to-Kernel Zero-Day - Guilherme Venere, Jacob Finn, Tucker Favreau, Jacob Stanfill, and James Nutland at Cisco’s Talos
TimbreStealer campaign targets Mexican users with financial lures - Cyber 5W
Pikabot Loader Detailed Analysis - Dr Josh Stroschein
Building a VM for Reverse Engineering and Malware Analysis! Installing the FLARE-VM - ElementalX
SpockStealer: Technical analysis of a Golang-based credential stealer. - Matthew at Embee Research
Advanced CyberChef Techniques for Configuration Extraction – Detailed Walkthrough and Examples - Fortra’s PhishLabs
DarkLoader Leads Malware Attacks in Q4 - Ron Bowes at GreyNoise Labs
Code injection or backdoor: A new look at Ivanti’s CVE-2021-44529 - Igor Skochinsky at Hex Rays
Igor’s Tip of the Week #177: Unused argument attribute - Shusei Tomonaga at JPCERT/CC
New Malicious PyPI Packages used by Lazarus - Malwarebytes
- McAfee Labs
- NVISO Labs
Covert TLS n-day backdoors: SparkCockpit & SparkTar - Anmol Maurya and Siddharth Sharma at Palo Alto Networks
The Art of Domain Deception: Bifrost’s New Tactic to Deceive Users - Patrick Wardle at Objective-See
Apple Gets an ‘F’ for Slicing Apples - Petikvx
- Pulsedive
Balada Injector - Richard Christopher
Strela Stealer [IR/Malware Analysis] - Sonatype
- Melusi shoko at System Weakness
Malicious Document Analysis using oletools — python tools to analyze Microsoft Office files - Sudeep Singh and Roy Tay at ZScaler
European diplomats targeted by SPIKEDWINE with WINELOADER
MISCELLANEOUS
- Marco Fontani at Amped
Introducing DeepPlate, Amped’s Investigative Tool for AI-Powered License Plate Reading - Brian Yonek
Part 1 of Understanding the Incident Response Lifecycle: Preparing for the Storm - Dr. Tristan Jenkinson at ‘The eDiscovery Channel’
COPA v Wright – An Animated End to Craig Wright’s Satoshi Claims?? - Elan at DFIR Diva
Free & Affordable Training News Monthly: Feb – Mar 2024 - Marvin Ngoma at Elastic
A game of nations — How nation-states prepare for cyber threats with Locked Shields (part 2) - Fabian Mendoza at AboutDFIR
AboutDFIR Site Content Update – 03/01/2024 - Forensic Focus
- Hex Rays
IDA 8.4: Qt 5.15.2 sources & build scripts - Kevin Pagano at Stark 4N6
Forensics StartMe Updates (3/1/2024) - Magnet Forensics
- Matt Linton
You can’t Incident Command an email thread - SANS
- Security Onion
Security Onion Documentation printed book now updated for Security Onion 2.4.50! - Teri Radichel
I Created a Fake Entry In AWS VPC Flow Logs - David González Cuautle at WeLiveSecurity
Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses
SOFTWARE UPDATES
- Belkasoft
What’s new in Belkasoft X v.2.4 - Canadian Centre for Cyber Security
Assemblyline Release 4.5.0.5 - Costas K
LNK & Jumplist Browser - CyberYom
Expanding your Toolkit: MFTAnalyzer - Digital Sleuth
winfor-salt v2024.3.5 - Magnet Forensics
- Manabu Niseki
Mihari v7.4.0 - MasterParser
MasterParser-v2.4 - OpenCTI
6.0.3 - Oxygen Forensics
- Passmark Software
OSForensics – V11.0 build 1005 28th February 2024 - Regipy
4.0.0 - Security Onion
Security Onion 2.3.290 now available including Suricata and Zeek updates! - Sigma
r2024-02-26
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!
Discover more from This Week In 4n6
Subscribe to get the latest posts sent to your email.