As always, thanks to those who give a little back for their support!
FORENSIC ANALYSIS
- Andrea Fortuna at ‘So Long, and Thanks for All the Fish’
iOS Forensics: how to perform a logical acquisition with libimobiledevice - Ashley Pearson
Volatility 3 Cheatsheet - Doug Metz at Baker Street Forensics
Collecting from Microsoft Teams using PowerShell - Jess Garcia at DS4N6
[BLOG] DS4N6 – The Road So Far – Part II, by Jess Garcia - Forensafe
- The DFIR Report
Conti Ransomware - Vignesh Mudliar at 4sysops
Tracing emails in Microsoft 365 with PowerShell
THREAT INTELLIGENCE/HUNTING
- Advanced Intelligence
From Dawn to “Silent Night”: “DarkSide Ransomware” Initial Attack Vector Evolution - Anomali
- Anton Chuvakin
SOC Trends ISACA Webinar Q&A - Awake Security
Catching the White Stork in Flight - Azure Sentinel
- BI.Zone
From pentest to APT attack: cybercriminal group FIN7 disguises its malware as an ethical hacker’s… - Pablo Ambite at BlackArrow
Leveraging Microsoft Teams to persist and cover up Cobalt Strike traffic - Blue Team Blog
DarkSide Ransomware Operations – Preventions and Detections. - Mike Behrmann at Blumira
Incident Response Guide For Ransomware Attacks - Brad Duncan at Malware Traffic Analysis
- Censys
Censys Search 2.0 Beta Announcement - Check Point Research
- CISA
Eviction Guidance for Networks Affected by the SolarWinds and Active Directory/M365 Compromise - Cisco’s Talos
- Cofense
- CrowdStrike
Response When Minutes Matter: Rising Up Against Ransomware - Csaba Fitzl at ‘Theevilbit’
Beyond the good ol’ LaunchAgents – 15 – xsanctl - Dr. Brian Carrier at Cyber Triage
Cyber Triage 2.14.4 – Detect Exchange WebShells - Cybereason
- Cyberint
Colonial Pipeline Incident - TIm Helmin and John Conwell at DomainTools
Domain Blooms: Identifying Domain Name Themes Targeted By Threat Actors - Mike Hoffman and Dr. Tom Winston at Dragos
Recommendations Following the Colonial Pipeline Cyber Attack - EclecticIQ
Phishing Emails Impersonate Maritime Industry in Likely BEC Campaign - Esentire
- Callum Roxan and Sami Ruohonen at F-secure
Prelude to Ransomware: SystemBC - Jordan Nuce, Jeremy Kennelly, Kimberly Goody, Andrew Moore, Alyssa Rahman, Matt Williams, Brendan McKeague, and Jared Wilson at Fire Eye Threat Research
Shining a Light on DARKSIDE Ransomware Operations - Flashpoint
- Fortinet
- Drew Schmitt at GuidePoint Security
From ZLoader to DarkSide: A Ransomware Story - HP Wolf Security
Announcing HP Wolf Security, and a New Report Assessing Remote Working Cyber Risks - InfoSec Write-ups
SPYSE — Not Your Regular Internet Search Engine - InQuest
Dive Into Cobalt Strike - Intezer
7 Most Important AWS Security Tools - Intrusion Truth
Who is Mr. Zhao? - Jason Trost at Covert.io
Seven Short Links of Dictionary DGA Detection - Scythe
- Devon Ackerman, Josh Mitchell, and Mario Ciccarelli at Kroll
EPHEMERAL LOCKPICKER: Malware Leveraged for Novel Intrusion Lifecycle and LuckyDay Ransomware Delivery - Raj Samani and Christiaan Beek at McAfee Labs
DarkSide Ransomware Victims Sold Short - McHugh Security
- Mehmet Ergene
Enterprise Scale Threat Hunting: Network Beacon Detection with Unsupervised Machine Learning and… - Microsoft 365 Security
- Arnold Osipov at Morphisec
AHK RAT Loader Used in Unique Delivery Campaigns - Ramarcus Baylor at Palo Alto Networks
DarkSide Ransomware Gang: An Overview - Pat H at pat_h/to/file
Gaining Threat-Intelligence the dodgy way - PC’s Xcetra Support
More on Yara And Building Rules - Pukhraj Singh
The SolarWinds hack pokes holes in Defend Forward – Observer Research Foundation - ReaQta
MITRE ATT&CK Carbanak+FIN7 Evaluation: ReaQta-Hive Achieves 100% Detection Coverage across the Cyber Kill Chain Autonomously and in Real-Time - Rory Wagner
- Dmitry Galov, Leonid Bezvershenko, and Ivan Kwiatkowski at Securelist
Ransomware world in 2021: who, how and why - Secureworks
Ransomware Groups Use Tor-Based Backdoor for Persistent Access - Cisco
- Limor Kessem at Security Intelligence
Shedding Light on the DarkSide Ransomware Attack - SentinelOne
Meet DarkSide and Their Ransomware – SentinelOne Customers Protected - Sophos
- Stefan Grimminck
The implications of neglecting IPv6 on your internet facing services - Teri Radichel
Colonial Pipeline Hack - Trend Micro
What We Know About Darkside Ransomware and the US Pipeline Attack - Drew Kirkpatrick at TrustedSec
Simple Data Exfiltration Through XSS - VirusTotal
- We are OSINTCurio.us
Searching with Shodan - ZScaler
UPCOMING EVENTS
- Association of Corporate Investigators
How a Digital Detective Approach can enhance your Investigation - Cellebrite
- Israel Barak and Jason Forcht at Cybereason
Webinar: Cybereason vs. DarkSide Ransomware - Austin Jackson and Eric Sigman at Cyborg Security
Thinking Like a Threat Actor, Pt. 2 - Jeff McJunkin
Top Active Directory Attacks: Understand, then Prevent and Detect
PRESENTATIONS/PODCASTS
- Cache Up with Jessica Hyde
Magnet Forensics Presents: Cache Up – Ep.50 – Special 50th Episode - A Conference for Defense
3 2 A Novel SIEM Solution That Doesn’t Cost an Arm and a Leg - Archan Choudhury at BlackPerl
Best Tools for Forensic Data Acquisition | MagnetRam, FTK Imager, Dumpit | Windows Forensics - Black Hat
- Black Hills Information Security
- Breaking Badness podcast
85. Vulnerabilities Are An Endless Cycle - Bret Witt
- Digital Forensic Survival Podcast
DFSP # 273 – CSA Cloud Threats 3 - Gerald Auger at Simply Cyber
Cybersecurity Thought Leader (John Strand dropping knowledge) - John Hubbard at ‘The Blueprint podcast’
Josh Johnson: PowerShell for the Blue Team - Kovar & Associates
Understanding CUAS - Positivity Blue Team
Mythical Malware Analysis - Recorded Future
Malware Party Tricks and Cybersecurity Trends - SANS Institute
- The Digital Forensics Files Podcast
Jessica Hyde of Magnet Forensics Joins Tyler Hatch of DFI Forensics
MALWARE
- 0day in {REA_TEAM}
Quick analysis note about DealPly (Adware) - 4rchib4ld Victory Road
Tomorrow night ? Honeymoon on Ice(loader) ? - Adepts of 0xCC
A physical graffiti of LSASS: getting credentials from physical memory for fun and learning - Malwarebytes Labs
- Avaddon ransomware campaign prompts warnings from FBI, ACSC
- Threat spotlight: DarkSide, the ransomware used in the Colonial Pipeline attack
- Newly observed PHP-based skimmer shows ongoing Magecart Group 12 activity
- Why MITRE ATT&CK matters—Choosing alert quality over quantity
- iPhone calendar spam attacks on the rise
- Nikhil Rathor at 0xthreatintel
In depth analysis of Stop Ransomware - Jeroen Beckers at NVISO Labs
Android overlay attacks on Belgian financial applications - SANS Internet Storm Center
- Who is Probing the Internet for Research Purposes?, (Sat, May 8th)
- Correctly Validating IP Addresses: Why encoding matters for input validation., (Mon, May 10th)
- Number of industrial control systems on the internet is lower then in 2020…but still far from zero, (Wed, May 12th)
- “Open” Access to Industrial Systems Interface is Also Far From Zero, (Fri, May 14th)
- Shaquib Izhar
Malware analysis (Part2) — Digital forensic of malicious files - Jagadeesh Chandraiah, Pankaj Kohli, Xinran Wu, and Szabolcs Lévai at Sophos
Fake Android and iOS apps disguise as trading and cryptocurrency apps - Verizon
2021 Data Breach Investigations Report - VMRay
Threat Bulletin: Exploring the Differences and Similarities of Agent Tesla v2 & v3
MISCELLANEOUS
- Andrew Rathbun at AboutDFIR
AboutDFIR Content Update 5/8/2021 - Belkasoft
Belkasoft X review by Pablo Croci - Ben Bornholm at HoldMyBeer
Getting started with Autopsy multi-user cluster - Amina Zilic at Binalyze
Introducing DRONE: A Revolutionary Approach to Remote Forensics and Compromise Assessment. - BushidoToken
CTI-Lexicon - Cyber 5W course release
Cyber 5W - Elan at DFIR Diva
Get Your Start Careers Just Launched! - Erik Hjelmvik at Netresec
Running NetworkMiner in Windows Sandbox - Forensic Focus
- Igor Skochinsky at Hex Rays
Igor’s tip of the week #39: Export Data - Joshua James
Welcome to the Africa Digital Forensics CTF - Justin Kohler at SpecterOps
BloodHound Enterprise vs. BloodHound Open-Source - Marco Fontani at Amped
Wrapping Up Video Evidence Pitfalls: Now You Know What You Didn’t Know - SANS
- Sophos
How the Sophos Managed Threat Response team helped put a dangerous online sextortionist behind bars for 75 years - Lesley Carhart
Reasonable IR Team Expectations - Vadim Sedletsky at CyberArk
Opportunistic vs. Targeted Ransomware Attacks - John Patzakis at X1
X1 Social Discovery Case Law Update - Yulia Samoteykina at Atola
The Story of TaskForce in 11 Acts
SOFTWARE UPDATES
- Alexis Brignoni at ‘Initialization Vectors’
CLEAPP it! – ChromeOS Logs Events And Protobuf Parser - DME Forensics
DVR Examiner 3.0.2 is now available! - F-Response
Newest F-Response (CE, CE+C, EE, Univ) release now with Cloud Browsing - Forensafe
ArtiFast Clubhouse Artifact Parser - Geoffrey Czokow at Hex Rays
Announcing version 7.6 for IDA Freeware! - iNPUT-ACE
iNPUT-ACE Version 2.6.2 - James Duffy
Delta - mac_apt
20210512 - Martin Willing
MemProcFS-Analyzer - Medex Forensics
Medex - Mihari
v2.4.0 - Velociraptor
Release 0.5.9
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!