As always, thanks to those who give a little back for their support!
FORENSIC ANALYSIS
- Belkasoft
KnowledgeC Database Forensics with Belkasoft X - Blake Regan
Mount Up - Cloudyforensics
Google Cloud Forensics and Incident Response - Dr. Neal Krawetz at ‘The Hacker Factor Blog’
Indictment Documents - Haider at HK_Dig4nsics
Forensic Analysis of Windows Subsystem for Android (WSA) - Maxime Chouquet at Lexfo
CVE-2023-27997 – Forensics short notice for XORtigate - Md. Abdullah Al Mamun
Email Incident Response - NCC Group
New Sources of Microsoft Office Metadata – Tool Release MetadataPlus - The DFIR Report
A Truly Graceful Wipe Out
THREAT INTELLIGENCE/HUNTING
- MOVEit
- Are you ready for MOVEit?
- MOVEit: an Industry Analysis
- MOVEit Vulnerability Weaponized in Ransomware Attack
- Active exploitation of the MOVEit Transfer vulnerability — CVE-2023-34362 — by Clop ransomware group
- The Latest on Clop Ransomware and the MOVEit Vulnerability
- The MOVEit Zero-Day Vulnerability and the Importance of Cross Domain Solutions in Data Transfer
- MOVEit Transfer CVE-2023-34362 Deep Dive and Indicators of Compromise
- INSIGHT – MOVEit Zero-Day Reminds Us Yet Again to Be Diligent in Monitoring Our IT Infrastructure
- MOVEit discloses THIRD critical vulnerability
- The MOVEit Transfer Vulnerability: What You Need to Know
- MOVEit Vulnerabilities: What You Need to Know
- Adam at Hexacorn
Mitre Att&ck – from JSON to CSV - Adam Goss
Python Threat Hunting Tools: Part 7 — Parsing CSV - Anomali
Anomali Cyber Watch: Fractureiser Attempted Clipboard-Poisoning VM Escape, Asylum Ambuscade Spies as a Side Job, Stealth Soldier Connected with The Eye on The Nile Campaign, and More. - Piotr Kijewski at APNIC
Threat activity and vulnerabilities in Indonesia, Malaysia, Philippines, and Thailand - Samad Khawaja at AT&T Cybersecurity
Threat Hunt: KillNet’s DDoS HEAD Flood Attacks – cc.py - Francis Guibernau and Giovanni López at AttackIQ
Attack Graph Response to CISA Advisory AA23-165A: Understanding Ransomware Threat Actors: LockBit - Jeremy Fuchs at Avanan
Using Legitimate PDFs for BEC 3.0 Attacks - Black Hills Information Security
Evasive File Smuggling with Skyhook - Brad Duncan at Malware Traffic Analysis
- 2023-06-12 – 30 days of Formbook: Day 8, Monday 2023-06-12 – “EE2Q”
- 2023-06-11 – 30 days of Formbook: Day 7, Sunday 2023-06-11 – GuLoader Formbook “XCHU”
- 2023-06-10 – 30 days of Formbook: Day 6, Saturday 2023-06-10 – “SN84”
- 2023-06-13 – 30 days of Formbook: Day 9, Tuesday 2023-06-13 – XLoader “MD8S”
- 2023-06-14 – 30 days of Formbook: Day 10, Wednesday 2023-06-14 – “J0C7”
- 2023-06-15 – 30 days of Formbook: Day 11, Thursday 2023-06-14 – “GA94”
- 2023-06-16 – 30 days of Formbook: Day 12, Friday 2023-06-16 – “TFGP” (ISC diary)
- Cado Security
Tracking Diicot: an emerging Romanian threat actor - CERT Ukraine
Кібератака групи UAC-0057 (GhostWriter) у відношенні державної організації України з використанням PicassoLoader та Cobalt Strike Beacon (CERT-UA#6852) - CERT-AGID
Sintesi riepilogativa delle campagne malevole nella settimana del 10 – 16 giugno 2023 - Check Point
- Checkmarx Security
- CISA
Understanding Ransomware Threat Actors: LockBit - Cisco’s Talos
- Cofense
- Maya Rotenstreich at CyberProof
How APTs Maintain a Silent Grip on Enterprise Networks - Cyberwarzone
- Cyble
- Cyfirma
Weekly Intelligence Report – 16 June 2023 - Terry Mayer at Cyjax
Cyjax White Paper – Strategic Intelligence Report on Latin America and the Caribbean: Synopsis - Dirk-jan Mollema
Obtaining Domain Admin from Azure AD by abusing Cloud Kerberos Trust - Eric Conrad
Leave Only Footprints: When Prevention Fails - Esentire
- Yuzuka Akasaka at Flare
- 11 Free Threat Intelligence Tools for 2023
- Ransomware Gangs: 5 Tips for Defending Against Organized Cybercrime Groups
- Detecting Phishing Domains: A Quick Guide
- What is the Lifecycle of a Ransomware Attack?
- Cyber Threat Detection: The Definitive Guide
- Dark Web Investigations: 5 Best Practices
- Domain Takedown: Removing Spear Phishing Domains for Free
- Threat Spotlight: Incident Response & Cybercrime in 2023
- Flashpoint
- Grayson North, Jason Baker, and Nic Finn at GuidePoint Security
GRIT Ransomware Report: May 2023 - HP Wolf Security
- InfoSec Write-ups
- Jacob Baines at VulnCheck
Fake Security Researcher GitHub Repositories Deliver Malicious Implant - Jonathan Johnson
Understanding Telemetry: Kernel Callbacks - Kaido Järvemets
- Mandiant
- Ryan Hausknecht at Microsoft’s ‘Security, Compliance, and Identity’ Blog
Detection Engineering in Azure & Introducing AzDetectSuite - Jeffry Gunawan at MII Cyber Security
Microsoft Sentinel Article Series: Integrate IBM X-Force Threat Intelligence Feed Into Microsoft… - MITRE-Engenuity
- Ray Canzanese at Netskope
Netskope Threat Labs Stats for May 2023 - Nikos Mantas at Falcon Force
FalconFriday — Automating acquisition for incident response! - Ryan Kalember at Proofpoint
The 2023 Human Factor Report Analyzes Threats in the Cyber Attack Chain - Chad Knipschild at Recorded Future
Ransomware Is Changing: Why Threat Intelligence is Essential - Red Canary
- Riam Kim-McLeod at ReliaQuest
Clop Leaks: First Wave of Victims Named - S-RM Insights
- SANS Internet Storm Center
- Geoserver Attack Details: More Cryptominers against Unconfigured WebApps, (Mon, Jun 12th)
- DShield Honeypot Activity for May 2023 , (Sun, Jun 11th)
- Deobfuscating a VBS Script With Custom Encoding, (Wed, Jun 14th)
- Another RAT Delivered Through VBS, (Fri, Jun 16th)
- Formbook from Possible ModiLoader (DBatLoader) , (Sat, Jun 17th)
- Brute-Force ZIP Password Cracking with zipdump.py, (Sun, Jun 18th)
- Rick Bosworth at SentinelOne
Anatomy of a Cloud Incident | SentinelOne’s Vigilance vs. IceFire Ransomware - SOCRadar
Real-Life Examples of Successful Threat Intelligence Operations - Sophos
- Rianna MacLeod at Sucuri
Demystifying Website Hacktools: Types, Threats, and Detection - Sygnia
Case Study: cracking a global Adversary-In-The-Middle campaign using a threat intelligence toolkit - Symantec Enterprise
Shuckworm: Inside Russia’s Relentless Cyber Campaign Against Ukraine - Miguel Hernández at Sysdig
KeePass CVE-2023-32784: Detection of Processes Memory Dump - Team Cymru
Darth Vidar: The Aesir Strike Back - Threatmon
Cyber Threat Report: Analyzing Ransomware and Apt Attacks Targeting Türkiye – May 2023 - Trellix
The Anatomy of HTML Attachment Phishing: One Code, Many Variants - Trend Micro
- TrustedSec
- Trustwave SpiderLabs
- Mark Rasch at Unit 221B
The Importance of “Effective” Threat Intelligence - VirusTotal
- Wladimir Palant at ‘Almost Secure’
Why browser extension games need access to all websites
UPCOMING EVENTS
- Cyacomb Forensics
Rapid Digital Triage Tools Drop-In Session - Gerald Auger at Simply Cyber
- Justin Tolman at The Cyber Social Hub
Breaking Down SQLite Databases - Magnet Forensics
PRESENTATIONS/PODCASTS
- Black Hills Information Security
Talkin’ About Infosec News – 6/15/2023 - Breaking Badness
157. They Ransomware - Cellebrite
Automating Remote Mobile Collections for eDiscovery and Investigations - Cloud Security Podcast by Google
EP125 Will SIEM Ever Die: SIEM Lessons from the Past for the Future - CrowdStrike
Cloud Threat Summit - CySecK
Webinar on “Network Attacks and Defence” - Dark Mode
Defending Against Digital Extortion & Ransomware – Recorded Future - Day Cyberwox
Initial Thoughts on Certified CyberDefender (CCD): Blue Team Certification For SOC Analysts - Detections by SpectreOps
DCP Live – Session 9 - Digital Forensic Survival Podcast
DFSP # 382 – Protocol Buffers - John Hammond
How Hackers Evade Program Allowlists with DLLs - John Hubbard at ‘The Blueprint podcast’
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence - Swachchhanda Shrawan Poudel at Logpoint
On Demand: Vice Society’s Double Extortion – Demanding Ransom and Threatening Data Leaks - Magnet Forensics
- MSAB
How to Use Areas of Interest in XAMN Pro? - RickCenOT
BREAKING DOWN “I will pwn your Veeder-Root TLS 350 gas station inventory system” - SANS
- SentinelOne
LABScon Replay | Star-Gazing: Using a Full Galaxy of YARA Methods to Pursue an Apex Actor - The Defender’s Advantage Podcast
Threat Trends: A Requirements-Driven Approach to Cyber Threat Intelligence
MALWARE
- Abdallah Elshinbary
Dotnet String Decryptor - ASEC
- c3rb3ru5d3d53c
[66] LiveStream – Reversing The DUMBEST HACK I’ve Ever Seen (Redline Stealer Part 9) - Hex Rays
- InfoSec Write-ups
- Darren Spruell, Chase Sims, and Brett Stone-Gross at InQuest
Mystic Stealer: The New Kid on the Block - Kyle Cucci at SecurityLiterate
How Malware Abuses the Zone Identifier to Circumvent Detection and Analysis - Malvuln
Clop Ransomware Crypto Logic Flaw - Rintaro Koike at NTT Security Japan
SteelCloverが使用する新たなマルウェアPowerHarborについて - OALABS Research
RisePro Triage - Lee Wei Yeong, Xingjiali Zhang, Yang Ji, Wenjun Hu and Royce Lu at Palo Alto Networks
Android Malware Impersonates ChatGPT-Themed Applications - Securelist
- Todyl
Threat Advisory: XWorm 4, Part 1 – File Deobfuscation - Trellix
- VMRay
From a OneNote Document to the Execution of Emotet - Lukas Stefanko at WeLiveSecurity
Android GravityRAT goes after WhatsApp backups
MISCELLANEOUS
- Elcomsoft
- Forensic Focus
- Christa Miller at Forensic Horizons
A Juror’s Perspective of Digital Evidence - Magnet Forensics
- Mirror review
Heather Mahalik: Leading The Way In Digital Forensics - Salvation DATA
Unlock Hidden Data with Forensic Data Recovery Services - SANS
Cybersecurity Jobs: Security Awareness Officer (Japanese) - Wessel Hissink
Velocideploy – o – Matic, The Story
SOFTWARE UPDATES
- Andrew Rathbun
KAPE-EZToolsAncillaryUpdater 4.1 - Belkasoft
Belkasoft X v.2.0: Large-Scale Cases and Enterprise-Level Performance, More Drones and Clouds, YARA, Sigma and Hashset Analysis Improvements, and Other Significant Updates. - Crowdstrike
Falconpy Version 1.2.16 - Didier Stevens
Update: zipdump.py Version 0.0.26 - dnSpyEx
v6.4.0 - Elcomsoft
Supporting Sage 50 Accounting 2023 and Sage 50 Accounts 2023 - Magnet Forensics
- Manabu Niseki
Mihari v5.2.4 - MISP
MISP 2.4.172 released with new TOTP/HTOP authentication, many improvements and bugs fixed - Passmark Software
OSForensics V10.0 Build 1014 14th June 2023 - Sandfly Security
Sandfly 4.5.0 – Powerful New Expression Syntax - Xways
- Yamato Security
Hayabusa v2.6.0 🦅 - YARA
v4.3.2 - Yogesh Khatri
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!