Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections.
Both of us are getting ready for the DFIR Summit this July, join us! Lodrina is keynoting the Solutions Track, and I’ll be there for the first beta of FOR308 Digital Forensics Essentials.
As always, thanks to those who give a little back for their support!
FORENSIC ANALYSIS
- Blackbag Technologies
What Can I Recover from a BFU Extraction? - Bluesmoke4n6
Get your red Solo cup: It’s time for a little Houseparty - Barak Goldberg at Cellebrite
How to Find User Activity Using the Digital Wellbeing Native App - Cheeky4n6Monkey
Recovering and Replaying Garmin Voice Instructions - Elcomsoft
- Forensicator
Parsing iOS Camera Roll using Python - James Duffy
- Mail Xaminer
- Theo Giovanna and hacktobeer at Open Source DFIR
Introducing Libcloudforensics - Praeterforensis
Geodata & Mobile Telephony Artifacts in 3rd-Party Android Apps: Recreating User Travel Patterns - SalvationData
[Case Study] Mobile Forensics: Forensic Data Extraction from Android Devices Using ADB (Android Debug Bridge) Part I - Sandfly Security
Using Elasticsearch and Kibana to Investigate Suspicious Linux Activity with Sandfly
THREAT INTELLIGENCE/HUNTING
- New Twitter handle for NSA and a new blog post too
Exim Mail Transfer Agent Actively Exploited by Russian GRU Cyber Actors - Zhang Zaifeng at Network Security Research Lab at 360
Look at NTP pool using DNS data - Adam at Hexacorn with daily updates this week
- Josh Gomez at AT&T Cybersecurity
Stories from the SOC – System compromise with ateral movement - The Threat Research Team at Anomali
Weekly Threat Briefing: Data Breach, Ransomware, Spyware, and More - Troy Kent at Awake Security
Encrypted Traffic Analysis: Encrypted DNS – Privacy, Security and the SOC (Part 3) - Juan Andres Guerrero-Saade with Christiaan Beek at Epic Turla – The Lost Reports
SysInTURLA - Britton Manahan at Expel
Obfuscation, reflective injection and domain fronting; oh my! - Falcon Force
- Raj Chandel at Hacking Articles
- Andy Ratcliffe at InfoSec matters
Squid Proxy with SOF-ELK Part 2 Analysis - Mark Baggett
The SANS SEC504 Windows Cheat Sheet Lab - NSA
Sandworm Actors Exploiting Vulnerability In Exim Mail Transfer Agent - Scott Piper at ‘Summit Route’
Client Side Monitoring - Alex Burinskiy at SentinelOne (Registration required)
macOS Threat Hunting & Incident Response eBook | Intro By Alex Burinskiy - Rootsecdev
Hardening Azure Active Directory from Attacks and insider threats - Jason Lang at TrustedSec
Automating a RedELK Deployment Using Ansible
UPCOMING WEBINARS/CONFERENCES
- Jessica Hyde at Magnet Forensics
Magnet Forensics Presents: Cache Up - Cellebrite
- Matt McFadden and Lexi Michaels at Blackbag Technologies
Trust But Verify: Digital Artifact Edition - Kevin from Cyber Social Hub
#DFIR Mixology - Magnet Forensics
AXIOM Cyber Interactive Training: Remote Acquisition Tips & Tricks with AXIOM Cyber
PRESENTATIONS/PODCASTS
- Alexis Brignoni is running a Python study group and schooling us all on WAL files
- Dave Cowen and Matt Seyer
Forensic Lunch 5/29/20 - Kevin Ripa at SANS
- Black Hills Information Security
- BlackBag Technologies
- BlackBag Tip of the Day: Keychain Processing
- BlackBag Tip of the Day: iCloud Production Processing and Investigating
- BlackBag Tip of the Day: Decrypting the iCloud Production on MacOS
- BlackBag Tip of the Day: Decrypting the iCloud Production on Windows
- BlackBag Tip of the Day: Parsing AirDrop Artifacts
- BlackBag Tip of the Day: Working with iCloud Production Data
- Digital Forensic Survival Podcast
DFSP # 223 – Apple Meta - Down the Security Rabbithole Podcast
DtSR Episode 396 – Verizon DBIR 2020 Analysis - Lee Reiber at Mobile Forensic Investigations
Oxygen Forensics Episode 112 - Magnet Forensics
From the Training Team: Forensic Fundamentals (AX100) - SANS
- Nina Alli and Beau Woods at White Hats and Lab Coats
Episode 15 – Digital Forensics in Healthcare – Najla Lindsay - Yogesh Khatri and Alexandra Cartwright
macOS Forensics: The Next Level – Taming the T2 Chip & More
MALWARE
- Eli Salem, Lior Rochberger, and Assaf Dahan of the Nocturnus team at Cybereason reclassify Valak as an infostealer
Valak: More than Meets the Eye - Josh Stroschein at 0xevilc0de
Maldoc uses template injection for macro execution - Andrea Fortuna at ‘So Long, and Thanks for All the Fish’
Niles: a simple telegram bot template for Heroku - Andreas Klopsch at ‘Malware and Stuff’
Examining Smokeloader’s Anti Hooking technique - Ivan Pisarev at Blog Group-IB
IcedID: When ice burns through bank accounts - Brad Duncan at Malware Traffic Analysis has posted some additional packet captures for analysis
- Guillermo Taibo at CrowdStrike
Weaponized Disk Image Files: Analysis, Trends and Remediation - Darknet (Also, lol)
Quasar RAT – Windows Remote Administration Tool - Alvaro Muñoz with others at GitHub Security Lab
The Octopus Scanner Malware: Attacking the open source supply chain - Huseyin Rencber on Banking Malware
Banka Domaini Taklit Edilerek Gönderilen Malware İncelemesi - Herbie Zimmerman at Lost in Security (and mostly everything else)
2020-05-27 Netwire Malspam - Pieter Arntz at Malwarebytes Labs
Maze: the ransomware that introduced an extra twist - Born at Nullteilerfrei
Zloader String Obfuscation - Or10n at oR10n Labs
Reverse Engineering the Mustang Panda PlugX Loader - Brad Duncan at Palo Alto Networks
Goodbye Mworm, Hello Nworm: TrickBot Updates Propagation Module - Matthew Berninger at Rapid7
The Masked SYNger: Investigating a Traffic Phenomenon - Robert Halar and Barbara Drašković at ReversingLabs Blog
Spying on SpyNet - SANS Internet Storm Centre Handler Diaries
- Trend Micro links to their whitepaper by Mayra Rosario Fuentes (67 page PDF)
How the Cybercriminal Underground Has Changed in 5 Years - Emiliano Martinez at VirusTotal Blog
I did not know you could do X, Y, Z with VirusTotal - Andrew Case at Volatility Labs
When Anti-Virus Engines Look Like Kernel Rootkits - ZScaler
- COVID-19, Coronavirus, and remote workforce threats:
- CrowdStrike
Lateral Movement Detection with a Remote Workforce - Ben Gross at Deep Instinct
Aghast at Aggah: Teasing Security Controls with Advanced Evasion Techniques - G Data Security
Dumping COVID-19.jar with Java Instrumentation - Eugene Kaspersky at Kaspersky Lab
ATMs need quarantines too! - Yoroi
Himera and AbSent-Loader Leverage Covid19 Themes
- CrowdStrike
MISCELLANEOUS
- Andrew Rathbun at AboutDFIR
AboutDFIR Content Update 5/27/2020 - Action Dan at LockBoxx
Red Teaming at NCCDC 2020 - Acelab
New Features of the PC-3000 Portable III: 2-in-1 SD/mSD Card Reader Adapter and Extended Functionality of the Standalone Mode - Marco Fontani at Amped
Speed Matters! Amped Replay’s Smooth Playback Makes Playback Fluid Even for High-Resolution Videos - Anton Chuvakin
Modern Cyber Defense Books - Belkasoft
- Cellebrite
- CrowdStrike
The Human Element of Detection and Response - Igor Mikhaylov at Cyber Forensicator
Utilities go for launch! - Didier Stevens
AdHoc GitHub Repository - Joshua James at Digital Forensic Science
Notes on Installing an Autopsy Multi-user Cluster - Forensic Focus
- Foxton Forensics
May Newsletter - H-11
Exporting your data from Google - Vladimir Unterfingher at Heimdal Security
Ten Open-Source EDR Tools to Enhance Your Cyber-Resilience Factor - Howard Oakley at ‘The Eclectic Light Company’
How to reveal ‘private’ messages in the log - Lee Whitfield at Forensic 4cast
Yet another Shameless Plug - Magnet Forensics
Thank You for an Unbelievable Magnet Virtual Summit! - Mail Xaminer
- David Ruiz at Malwarebytes Labs
Coalition Against Stalkerware bulks up global membership - Mike at ØSecurity
- Oxygen Forensics
Oxygen Forensic® Viewer: See it all, Wherever you are - Red Canary
A guide to evaluating EDR security tools - Bret Peters at ADF
New Self Paced DEI Online Training Class - Ryan Campbell at ‘Security Soup’
Weekly News Roundup — May 24 to May 30 - SANS
SOFTWARE UPDATES
- Acelab
The new versions of PC-3000 Portable/Express/UDMA-E/SAS Ver. 6.7.18, Data Extractor/Data Extractor RAID Edition Ver. 5.10.11, PC-3000 SSD Ver. 2.8.5 are available! - AChoir
AChoir v4.4 - Eric Zimmerman at Binary Foray
KAPE 0.9.2.0 released! - Brim
v0.10.0 - Brian Moran
RDPieces - Cado Live
Introducing Cado Live — A Free Forensic Imaging Tool for the Cloud - Didier Stevens
New Tool: simple_ip_stats.py - Elcomsoft
- Mount Image Pro
26 May 2020 – v7.1.2.1882 - Harlan Carvey
Regripper 3.0 - mac_apt
20200529 - OSForensics
V7.1 build 1012 28th May 2020 - X-ways
X-Ways Forensics 20.0 Beta 3
And that’s all for the week! If you think we’ve missed something, or want us to cover something specifically hit us up through the contact page or on the social pipes!