As always, thanks to those who give a little back for their support!
FORENSIC ANALYSIS
- Blake Regan
How to create a forensic image of a physical hard drive using FTK Imager - Alan Flora at Cellebrite
Using Pathfinder to Avoid Ethical Dilemmas in Digital Forensics - CTF导航
- Digital Forensics Myanmar
- Joseph Moronwi at Digital Investigator
- Oleg Afonin at Elcomsoft
iOS Backups: Leftover Passwords - Forensafe
Investigating Recent Items - Haircutfish
- TryHackMe
Windows Forensics 1 — Task 5 Exploring Windows Registry & Task 6 System Information and… - TryHackMe
Windows Forensics 1 — Task 7 Usage or knowledge of files/folders - TryHackMe
Windows Forensics 1 — Task 8 Evidence of Execution - TryHackMe
Windows Forensics 1 — Task 9 External Devices/USB device forensics - TryHackMe
Windows Forensics 1 — Task 10 Hands-on Challenge & Task 11 Conclusion
- TryHackMe
- Aaron Stratton at InfoSec Write-ups
Analysis of a Smishing Text - Kevin Pagano at Stark 4N6
The Bots are Buzzing – Bumble on Android - Mailxaminer
- Search inside PST Files without Outlook for Evidence
- Convert Mails & Attachments from Outlook PST to MSG Files
- Recovering Microsoft Exchange Artefacts with eDiscovery Export Tool!
- EML File Forensics – Extract Evidence from Email Message File
- Here’s How to Convert Gmail to PST Using Forensic Tool?
- Everything You Should Know About Opera Mailbox Forensics
- Ultimate Way to Perform Mozilla Thunderbird Email Forensics
- Tags and Privileged Files – MailXaminer
- Best Ever Search Options for Precise Email Investigation
- 100% Proven Solution to Perform Office 365 Email Forensics
- Know How to Convert Netscape Mail to Outlook PST File?
- Zoho Mail Forensics for Mailbox and Email Header Analysis
- OCR Reader Technology to Extract Textual Data from Image
- Export Options of MailXaminer Forensics Tool
- Outlook Express Email Forensics – Explore DBX File Email Header
- Analyze Thunderbird MBOX Artifacts with Thunderbird Email Viewer
- Oxygen Forensics
Import Microsoft Outlook Data Files Into Oxygen Forensic® Detective
THREAT INTELLIGENCE/HUNTING
- MITRE Evaluations
- Analyzing the 2022 MITRE ATT&CK Evaluation for Managed Services
- BlackBerry Participates in MITRE Managed Services Evaluation
- Microsoft Defender Experts for Hunting demonstrates industry-leading protection in the 2022 MITRE Engenuity ATT&CK® Evaluations for Managed Services
- MITRE Engenuity ATT&CK® Evaluations: Managed Services — OilRig (2022) and the Top 10 Ways to…
- NVISO EXCELS IN MITRE ATT&CK® MANAGED SERVICES EVALUATION
- Unit 42 Strikes Oil in MITRE Engenuity Managed Services Evaluation
- New MITRE Engenuity ATT&CK® Evaluation: Rapid7 MDR Excels
- Crude OilRig: Drilling into MITRE’s Managed Service Evaluations
- MITRE Managed Services Evaluation | 4 Key Takeaways for MDR & DFIR Buyers
- Sophos MDR: Results from the first MITRE Engenuity ATT&CK Evaluation for Security Service Providers
- Dr. Nestori Syynimaa at AADInternals
Bypassing Azure AD home tenant MFA and CA - Anomali
Anomali Cyber Watch: Active Probing Revealed Cobalt Strike C2s, Black Basta Ransomware Connected to FIN7, Robin Banks Phishing-as-a-Service Became Stealthier, and More - Aqua
Tracee Newly Released Rules Detect Attackers Out-of-the-Box - Erica Mixon at Blumira
5 Best Practices For Security Log Retention - Cado Security
Cado Security, SentinelOne and Tines Make Kubernetes Investigation and Response Possible - CERT Ukraine
- Кібератака групи UAC-0010: розсилання електронних листів, начебто, від імені Держспецзв’язку (CERT-UA#5570)
- Розповсюдження електронних листів з фейковим сканером, начебто, від імені CERT-UA (CERT-UA#5583)
- Інформація щодо кібератак групи UAC-0118 (FRwL) з використанням шкідливої програми Somnia (CERT-UA#5185)
- CERT-AGID
Sintesi riepilogativa delle campagne malevole nella settimana del 05 – 11 novembre 2022 - Check Point Research
- Cisco’s Talos
- Cluster25
Sanctioned deals: the Irano-Russian connection under Ankara’s supervision. Analysis of the NPPD leak - Corelight
Detecting 5 current APTs without heavy lifting - CTF导航
- Cyble
- Darktrace
- Dirk-jan Mollema
Introducing ROADtools Token eXchange (roadtx) – Automating Azure AD authentication, Primary Refresh Token (ab)use and device registration - Joe St Sauver at DomainTools
Using Iris Investigate Pivot Tables to Collect Bulk Screenshots - Esentire
- Flashpoint
- Fortinet
- Mark Alpatsky and Sharef Hlal at Group-IB
Hired hand: Scammers mimic Saudi manpower provider - HHS
Venus Ransomware Targets Publicly Exposed Remote Desktop Services - Intel471
Denial-of-Service in the Cyber Underground - Nicole Fishbein at Intezer
How LNK Files Are Abused by Threat Actors - Koen Van Impe
ENISA Threat Landscape 2022 - Luke Leal
Strox Phishing Service & How It Works - Thibault Van Geluwe De Berlaere at Mandiant
They See Me Roaming: Following APT29 by Taking a Deeper Look at Windows Credential Roaming - Marco Ramilli
Phishing Kits: Threat Actors Analysis Research - Microsoft 365 Security
- Microsoft Security
Microsoft threat intelligence presented at CyberWarCon 2022 - Moath Maharmeh at C99.sh
Deception & Inspection: Gathering intelligence & increasing the red team infrastructure resiliency - Gustavo Palazolo at Netskope
- Robert Nixon at NVISO Labs
Visualizing MISP Threat Intelligence in Power BI – An NVISO TI Tutorial - Gijs Hollestelle at Falcon Force
FalconFriday — Detecting Active Directory Data Collection — 0xFF21 - PWC
A Muddy, Advanced Persistent Teacher - Anjali Raut at Quick Heal
QBOT – A HTML Smuggling technique to target victims - Dave Bogle and Brandon Dalton at Red Canary
Validate your defenses with Atomic Test Harnesses for Linux and macOS - Justin Palk at Red Siege Information Security
Introduction to Sliver - Resecurity
Amidst Rising Tax Refund Fraud, Consumers Need Better Dark Web Intelligence - Sandfly Security
SSH Key Credential Tracking with Sandfly Splunk App Update - SANS Internet Storm Center
- Kristen Cotten at Scythe
SCYTHE Presents: STEEP#MAVERICK IOCs - Dmitry Kondratyev and Andrey Ivanov at Securelist
The state of cryptojacking in the first three quarters of 2022 - Joan Soriano at Security Art Work
Threat Hunting: Probability based model for TTP covering (Parte I) - Securonix
- Aleksandar Milenkoski at SentinelLabs
SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders - SOCRadar
Increased Healthcare Security Breaches in 2022 - Will Schroeder and Lee Christensen at SpecterOps
Certificates and Pwnage and Patches, Oh My! - Ben Martin at Sucuri
Massive ois[.]is Black Hat Redirect Malware Campaign - Nigel Douglas at Sysdig
How to deal with ransomware on Azure - Trend Micro
- TrustedSec
UPCOMING EVENTS
- Black Hills Information Security
Atomic Spotlight: Exploiting HiveNightmare/SeriousSAM for Priv Escalation - Dragos
When Ransomware Strikes: The Impact of Ransomware in Operational Technology Environments - Magnet Forensics
- Stairwell
Plan for Peak SOC & IR Performance in 2023
PRESENTATIONS/PODCASTS
- Phoenix Cast
Mobile Forensics - Belkasoft
Tracking Potentially Malicious Files with Evidence of Execution - Black Hills Information Security
- BlueMonkey 4n6
Bootable Linux environment for forensics – Sumuri PALADIN - Breaking Badness
138. Into the W4SP’s Nest - Heather Mahalik at Cellebrite
How to Discover Artifacts in Cellebrite Physical Analyzer – Part 3 - Cloud Security Podcast by Google
EP95 Cloud Security Talks Panel: Cloud Threats and Incidents - Brian Carrier at Cyber Triage
ResponderCon 2022 – Videos – Batch 1 - Cyborg Security
Episode 3 - Detections by SpectreOps
Episode 27: Roberto Rodriguez - Didier Stevens
- Digital Forensic Survival Podcast
DFSP # 351 – Prefetch - FIRST
2022 FIRST Symposium Asia Pacific Regions - Game of Crimes
Part 1: Tim Stommel and the Queen of the Pacific - Gerald Auger at Simply Cyber
Want to See How LockBit Ransomware Actors Work? - Horangi Cyber Security
The Cyber Defense Matrix (Ask A CISO SE02EP41) - InfoSec_Bret
CyberDefenders – Eli - Insane Forensics
How To Use Window’s Advanced Network Connection Audit Logging to Detect and Hunt for Cyber Attackers - John Hammond
Cybercrime & Dark Web Conversations (w/ Shmuel!) - Koen Van Impe
CTI-Summit 2022 Luxembourg Presentations - LetsDefend
Red team vs Blue team: What is the difference? - Magnet Forensics
- Customer Story | Greater Manchester Police Save 9.5 hrs on Digital Investigations w/ Magnet AUTOMATE
- Getting Started with Magnet AXIOM Cyber
- Getting Started with Magnet AXIOM
- Getting Started With Magnet | AXIOM & AXIOM Cyber
- Getting Started With Magnet | Module 1 Part 1: Magnet AXIOM Cyber Process Settings
- Getting Started With Magnet | Module 1 Part 1: Magnet AXIOM Process Settings
- Getting Started With Magnet | Module 1 Part 2: Magnet AXIOM Process Settings
- Getting Started With Magnet | Module 2 Part 1: Examine UI and Explorers
- Getting Started With Magnet | Module 2 Part 2: Examine UI & Menus
- Getting Started With Magnet | Module 2 Part 3: Examine Analysis
- Getting Started With Magnet | Module 3 Part 1: Tags, Comments, Exports, and Portable Case
- Getting Started with Magnet | Module 3 Part 2: Case Reporting
- [Air]Tag You’re It! – a look through location artifacts generated by Apple’s AirTag, iOS, and macOS devices within the FindMy application.
- MalGamy
live about my resources - Ollie Whitehouse at NCC Group
Tales of Windows detection opportunities for an implant framework - OALabs
M1 Mac Malware Analysis VM Setup with Windows 11 (Free) - Sumuri
- The Defender’s Advantage Podcast
Threat Trends: Tracking DPRK Use of Cryptocurrencies - The Ransomware Files
Thank You
MALWARE
- 0xdf hacks stuff
- AK1001
Malware Analysis: TelegramRAT wrapped by pyinstaller - Akamai
KmsdBot: The Attack and Mine Malware - ASEC
- LockBit 3.0 Being Distributed via Amadey Bot
- ASEC Weekly Malware Statistics (October 31st, 2022 – November 6th, 2022)
- Distribution of Word File (External + RTF) Modified to Avoid Detection
- Penetration and Distribution Method of Gwisin Attacker
- Magniber Ransomware Attempts to Bypass MOTW (Mark of the Web)
- Emotet Being Distributed Again via Excel Files After 6 Months
- HackHound IRC Bot Being Distributed via Webhards
- Avast Threat Labs
PNG Steganography Hides Backdoor - Lawrence Abrams at BleepingComputer
Azov Ransomware is a wiper, destroying data 666 bytes at a time - Osanda Malith Jayathissa
Encrypting Shellcode using SystemFunction032/033 - CISA
10410305-1.v1 JSP Webshell - Lukasz D at Compass Security
A Symmetric Cipher Ransomware … YES! - Johann Aydinbas and Axel Wauer at DCSO CyTec
#ShortAndMalicious: StrelaStealer aims for mail credentials - Docguard
LockBit3.0 Manual Analysis - Brian Baskin at Ghetto Forensics
Flare-On 9 – The Worst Writeups - hasherezade’s 1001 nights
- Molly “PonchoSec” N. at Huntress
Creating macOS Ransomware - Igor Skochinsky at Hex Rays
- Kristina Balaam, Alemdar Islamoglu, Justin Albrecht, and Ruohan Xiong at Lookout
Lookout Discovers Long-running Surveillance Campaigns Targeting Uyghurs | Lookout - Pete Cowman at Hatching
Triage Thursday Ep. 89 - petikvx
- Louis Lang at Phylum Research Blog
Python Malware Replaces Crypto Addresses in Developer Clipboards - Ben Joels at Snyk
Key points from Google and Accenture’s ransomware white paper - Vlad at ‘Слава Україні — Героям Слава!’
McAfee – Trellix. Оновлення сертифікатів [UA] - VMRay
How to extract Emotet’s Configuration statically - Yassir Laaouissi
FlareOn 9 – Writeup - Zhassulan Zhussupov
Malware analysis: part 6. Shannon entropy. Simple python script. - Nipun Gupta at Zimperium
The Case of Cloud9 Chrome Botnet
MISCELLANEOUS
- Chris Brenton at Active Countermeasures
Why Threat Hunting should be a Security Standards Requirement - Avertium
MFA Breaches & MFA Fatigue - Belkasoft
[On-demand Сourse] Remote Acquisition with Belkasoft - Cassie Doemel at AboutDFIR
AboutDFIR Site Content Update 11/6/22 - Cellebrite
2022 Industry Trends Survey - Forensic Focus
- MSAB’s James Eichbaum Takes Us Behind the Scenes of Digital Forensic Tool Training
- How to Identify Social Media Images and Analyze Them with Amped Authenticate
- Reveal by Grayshift Now Generally Available
- Register for Webinar: Tips and Tricks: Data Collection for Cloud Workplace Applications
- Greater Manchester Police Completes Digital Investigations 9.5 Hours Faster With Magnet AUTOMATE
- Haircutfish
TryHackMe Junior Security Analyst Intro - Kristian Lars Larsen at Data Narro
The Challenges of EMOJIs in E-Discovery - Martin Boller at InfoSec Worrier
Live Remote Packet Analysis - Salvation DATA
Write a Forensic Report Step by Step [Examples Inside] - The Security Noob
Learn Computer Forensics – Second Edition by William Oettinger for Packt REVIEW - John Patzakis at X1
10 Unique and Compelling Features of X1 Social Discovery
SOFTWARE UPDATES
- Apache Tika
Release 2.6.0 – 11/3/2022 - Belkasoft
Belkasoft R 1.2 is released - BlueTeamOps
AllthingsTimesketch - Brian Maloney
OneDriveExplorer v2022.11.08 - Costas K
- CyberChef
v9.49.0 - Daniel Avilla
AvillaForensics - Didier Stevens
- Doug Burks at Security Onion
Security Onion 2.3.182 Now Available! - ExifTool
ExifTool 12.50 (production release) - Griffeye
Release of Analyze 22.2 - Metaspike
Forensic Email Intelligence v1.8.8348 - MSAB
XRY 10.3.1 Released today - Ryan Benson at dfir.blog
Unfurl v2022.11: Social Media Edition - Thiago Canozzo Lahr – Unix-like Artifacts Collector
uac-2.4.0-rc1 - Velociraptor
Release 0.6.7 RC3 - Yamato Security
Hayabusa v1.8.0 🦅
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!