As always, thanks to those who give a little back for their support!
FORENSIC ANALYSIS
- Emi Polito at Amped
Unroll a 360 Camera - Forensafe
- Salvation DATA
How to Recover Deleted Partition on Hard Disk? - Taz Wake
THREAT INTELLIGENCE/HUNTING
- 1Password
Security incident report - Adam at Hexacorn
- Adam Goss
Creating Your Own CTI Aggregator for Free: A Complete Guide - Any.Run
What is Cyber Threat Intelligence - Arch Cloud Labs
Abusing gdb Features for Data Ingress & Egress - Ash Shatrieh at F-Secure
The Changing Threat Landscape: Infostealers and the MacOS goldmine - Nick Desler at AttackIQ
Emulating Sogu/PlugX: The Sophistication of Malware Behaviors - Ax Sharma at BleepingComputer
Palestine crypto donation scams emerge amid Israel-Hamas war - BlueteamOps
Detecting ‘Dev Tunnels’ - Brad Duncan at Malware Traffic Analysis
- CERT-AGID
- Check Point
- CISA
CISA Announces Launch of Logging Made Easy - Cisco’s Talos
- Cloudflare
- Felix Aeppli at Compass Security
Device Code Phishing – Compass Tooling - Michael Steele at Confiant
ScamClub’s Deceptive Landing Pages - Simon Miteff at Corelight
Writing a Zeek package in TypeScript with ZeekJS | Corelight - Arfan Sharif at CrowdStrike
Getting Value from Your Proxy Logs with Falcon LogScale - CTF导航
- Cyfirma
Weekly Intelligence Report – 27 Oct 2023 - Darrel Lang at Bridewell
An Encounter with DarkGate: Phishing’s Next Vector - Sam Hanson at Dragos
Measuring the Potential Impact of PIPEDREAM Malware OPC UA Module, MOUSEHOLE - EclecticIQ
Cisco IOS XE Web UI Privilege Escalation Vulnerability; Sandworm Targets Ukrainian Telecom - Eric Capuano
Threat Hunting with Velociraptor – Long Tail Analysis Lab - Esentire
- Flashpoint
Cyber Threat Intelligence Index: Q3 2023 Edition - Fortra’s PhishLabs
Q3 Payload Report - Parth Gol at FourCore
Threat Hunting: Detecting Browser Credential Stealing [T1555.003] - GreyNoise
CVE-2023-4966 Helps Usher In A Baker’s Dozen Of Citrix Tags To Further Help Organizations Mitigate Harm - Haircutfish
TryHackMe Wireshark:Traffic Analysis — Task 3 ARP Poisoning & Man In The Middle and Task 4… - Alison Rusk at INKY
Fresh Phish: Streaming Platforms Are Targeted by Bad Actors Amid the Real Actors’ Strike - Miguel B at Intel Optics
- J Schell
Remote Management Monitoring tools - John F
Advice For Catching a RedLine Stealer - Kevin Beaumont at DoublePulsar
Mass exploitation of CitrixBleed vulnerability, including a ransomware group - Kim Zetter at ‘Zero Day’
Sophisticated StripedFly Spy Platform Masqueraded for Years as Crypto Miner - Bert-Jan Pals at KQL Query
Incident Response Part 3: Leveraging Live Response - Swachchhanda Shrawan Poudel at Logpoint
Emerging Threats Report: APT-29 – The Not So Cozy Bear - Bill Cozens at Malwarebytes Labs
Battling a new DarkGate malware campaign with Malwarebytes MDR - Microsoft Security
- Monty Security
Evasion by Annoyance: When LNK Payloads Are Too Long - Nasreddine Bencherchali
SigmaHQ Rule Release Highlights — r2023-10-23 - Jared Peck at Proofpoint
From Copacabana to Barcelona: The Cross-Continental Threat of Brazilian Banking Malware - PwC
Yellow Liderc ships its scripts and delivers IMAPLoader malware - Brian Donohue and Tess Mishoe at Red Canary
Emu-lation: Validating detection for Gootloader with Atomic Red Team - Ivan Righi at ReliaQuest
Ransomware and Cyber-extortion Trends in Q3 2023 - Roy Akerman at Rezonate
- SANS Internet Storm Center
- How an AppleTV may take down your (#IPv6) network, (Mon, Oct 23rd)
- Sporadic scans for “server-info.action”, possibly looking for Confluence Server and Data Center Vulnerability CVE-2023-22515, (Wed, Oct 25th)
- Adventures in Validating IPv4 Addresses, (Thu, Oct 26th)
- Size Matters for Many Security Controls, (Sat, Oct 28th)
- Securelist
- Sekoia
AridViper, an intrusion set allegedly associated with Hamas - SentinelOne
- Simone Kraus
- SOCRadar
- Nico Shyne at SpecterOps
Domain of Thrones: Part I - Splunk
Detect WS_FTP Server Exploitation with Splunk Attack Range - Ben Martin at Sucuri
FakeUpdateRU Chrome Update Infection Spreads Trojan Malware - Cedric Pernet at Trend Micro
How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime - Megan Nilsen at TrustedSec
- Josh Lemon at Uptycs
Combat Cybersecurity Alert Fatigue with a Priority Matrix - Daniel Pascual at VirusTotal
Unifying threat context with VirusTotal connectors - WeLiveSecurity
- Avigayil Mechtinger and Itamar Gilad at Wiz
Linux rootkits explained – Part 2: Loadable kernel modules
UPCOMING EVENTS
- Gerald Auger at Simply Cyber
Breaking Into DFIR: Is It Entry-Level? With Special Guest Jessica Hyde - Black Hills Information Security
BHIS – Talkin’ Bout [infosec] News 2023-10-30 - Cyborg Security
Mastering the Hunt: Translating intelligence to action - Dragos
Capture the flag 2023 - Magnet Forensics
- SANS
2023 SANS Difference Makers Awards Ceremony
PRESENTATIONS/PODCASTS
- AhmedS Kasmani
Setting up Malware Development Lab - Black Hills Information Security
BHIS / Antisyphon - Breaking Badness
170. MOVEit on Up - Cellebrite
How to maximize the performance of Cellebrite Physical Analyzer Ultra? - Dark Mode
AISA CyberCon 2023 Recap - Digital Forensic Survival Podcast
DFSP # 401 – INF Fetch Execute - Dr Josh Stroschein
Debugging Assembly Programs Using WinDbg and Time-Travel Debugging – Getting Started with Assembly - Dr. Meisam Eslahi at ‘Nothing Cyber’
Cyber Threat Hunt 101: Part 6 – 70+ Tools, Techniques, and Resources! - FIRST
Dissect: the Solution to Large-Scale Incident Response (and Why APTs Hate Us) | *Edited Version - Hardly Adequate
Hardly a Week 43 October 23, 2023 - Intel471
Should Ransom Payments Be Made Illegal - John Hammond
- Justin Tolman at AccessData
FTK Feature Focus – Mini Timeline – FTK 8.0 - Magnet Forenics
Collecting and Analyzing Mobile Evidence in the Workplace - Microsoft Threat Intelligence Podcast
China Threat Landscape: Meet the Typhoon - MSAB
How to import Berla iVe files in XAMN Pro? - Nextron Systems
THOR Cloud Lite Release Session - OALabs
Are Red Team Tools Helping or Hurting Our Industry? - Sandfly Security
Detecting Evasive Linux Malware Presentation - SANS Cloud Security
From Analyst to CISO and Board Member | S2-E1 - The CyberWire
No rest for the wicked HiatusRAT. - The Defender’s Advantage Podcast
Threat Trends: DHS Secretary Alejandro Mayorkas in Conversation with Kevin Mandia - Thomas Roccia
State-Sponsored Financially Motivated Attacks
MALWARE
- Any.Run
Unpacking the Use of Steganography in Recent Malware Attacks - ASEC
- Avast Threat Labs
Rhysida Ransomware Technical Analysis - Jarosław Jedynak at CERT Polska
Malware stories: Deworming the XWorm - Cluster25
The Duck is Hiring in Italy: DUCKTAIL Spread via Compromised LinkedIn Profiles - Matthew at Embee Research
- Igor Skochinsky at Hex Rays
Igor’s Tip of the Week #162: Where’s my code? The case of no-return call - MWLab
Decryption of AsyncRAT config strings with CyberChef - NVISO Labs
- OALABS Research
Origin Logger - Siddharth Sharma at Palo Alto Networks
When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief - Zhassulan Zhussupov
Malware and cryptography 21: encrypt/decrypt payload via WAKE. Simple C++ example. - ZScaler
MISCELLANEOUS
- Fabian Mendoza at AboutDFIR
AboutDFIR Site Content Update – 10/27/2023 - ADF Solutions
Exterro and ADF Solutions Announce Global Strategic Partnership - Cado Security
Cado Incident Readiness Dashboard: Comprehensive Cloud Incident Response Preparedness - CrowdStrike
CrowdStrike Services Offers Incident Response Executive Preparation Checklist - Doug Burks at Security Onion
- Security Onion 2.4 Feature o’ the Day – Dynamic Observable Extraction in SOC Cases
- Security Onion 2.4 Feature o’ the Day – SOC can now import PCAP and EVTX files
- 10% Early Bird discount for Security Onion for Analysts & Threat Hunters Class in December 2023!
- Security Onion 2.4 Feature o’ the Day – Manage User Accounts via SOC
- Security Onion 2.4 Feature o’ the Day – Manage Nodes via SOC
- Security Onion 2.4 Feature o’ the Day – SOC Grid Improvements
- Forensic Focus
- Howard Oakley at ‘The Eclectic Light Company’
Where is my file’s metadata? - MSAB
Interim Report Q3, July – September 2023 - Nick Pockl-deen
AISA CyberCon 2023 - Plainbit
- Robin Dimyan
A Threat is not a Threat Actor! - Sue Poremba at Security Intelligence
Cost of a data breach: The evolving role of law enforcement
SOFTWARE UPDATES
- Amped
Amped FIVE Update 31095: Frame Hash Analysis, Improvements to Copy & Verify, Automatic File Listing in Report and Much More - Digital Sleuth
v2023.30.3 - Eric Kutcher
Thumbcache Viewer - ExifTool
ExifTool 12.69 - Manabu Niseki
Mihari v5.6.2 - Metaspike
Forensic Email Intelligence – 2.1.12.2 - Wajih Yassine at Open Source DFIR
Introducing OSDFIR Infrastructure: Automating Deployment and Integration of Open Source DFIR Tools to Kubernetes - OpenCTI
5.11.12 - Sigma
Release r2023-10-23 - SigmaHQ
pySigma v0.10.6 - USB Detective
Version 1.6.4 (10/25/2023) - Xways
X-Ways Forensics 21.0 Beta 1
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!