As always, thanks to those who give a little back for their support!
FORENSIC ANALYSIS
- Cyber 5W
Windows Registry Analysis - Decrypting a Defense
NYC ShotSpotter Report, Deepfakes, Video ID Decision, Digital Evidence Standards, & More - Django Faiola at ‘Appunti di Informatica Forense’
iOS Booking.com – Hotels & Travel - Forensafe
Investigating Android Google Drive - Ian Whiffin at DoubleBlak
BrowserState.db last_viewed_time? (Again) - Memory Forensic
Memory Mystery Challenge
THREAT INTELLIGENCE/HUNTING
- Francis Guibernau at AttackIQ
Emulating the Sabotage-Focused Russian Adversary Sandworm– Part 2 - Avertium
New Ransomware Groups to Watch – RA World and DragonForce - CERT-AGID
- Check Point
1st July – Threat Intelligence Report - Permiso
Exploiting Cloud Secrets Management Repositories: Adversaries Tactics and Mitigation Strategies - Cyble
Increase in the exploitation of Microsoft SmartScreen vulnerability CVE-2024-21412 - Cyfirma
- Cyfirma
Weekly Intelligence Report – 05 July 2024 - Cyjax
Weekly Cyber Threat Intelligence Summary - Darktrace
A Busy Agenda: Darktrace’s Detection of Qilin Ransomware-as-a-Service Operator - James Coote at Delivr.to
GWT-Assisted HTML Smuggling - Rohit Sadgune at Detect Diagnose Defeat Cyber Threat
Linux threat hunting using CUT SORT UNIQ DIFF - Detect FYI
- Panos Koutsovasilis at Elastic
Tracing Linux: A file integrity monitoring use case - Esentire
Exploring the Infection Chain: ScreenConnect’s Link to AsyncRAT Deployment - Flashpoint
Understanding and Protecting Against Infostealer Malware: A Comprehensive Guide - HackTheBox
AS-REP roasting detection - Haircutfish
TryHackMe Room — Tactical Detection - Huntress
Hackers Are Hiding in Plain Sight: Insights from Our 2024 Cyber Threat Report | Huntress - I am Jakoby
LOLBINS AUTOMATED – a powershell module to make it TOO easy - Michael Zuckerman at Infoblox
DNS Early Detection – Breaking the Coral Raider Kill Chain - Tom Philippe at InfoSec Write-ups
When the Hunter Becomes the Hunted: Using Minifilters to Disable EDRs - Intel471
Assessing the Disruptions of Ransomware Gangs - Brian Krebs at Krebs on Security
The Not-So-Secret Network Access Broker x999xx - Ugur Koc and Bert-Jan Pals at Kusto Insights
Kusto Insights – June Update - Lina Lau at Xintra
Detecting Lateral Movement in Entra ID: Cross Tenant Synchronization - Obsidian Security
Shadow Linking: The Persistence Vector of SaaS Identity Threat - Sebastien Meriot and Christophe Bacara at OVHcloud
The Rise of Packet Rate Attacks: When Core Routers Turn Evil - Phylum
Persistent npm Campaign Shipping Trojanized jQuery - Prodaft
- Recorded Future
Caught in the Net: Using Infostealer Logs to Unmask CSAM Consumers - Red Alert
Monthly Threat Actor Group Intelligence Report, May 2024 (KOR) - ReliaQuest
Medusa Attack Analysis - Ryan Hicks at Kroll
CLEARFAKE Update Tricks Victim into Executing Malicious PowerShell Code - SANS Internet Storm Center
- Sekoia
Exposing FakeBat loader: distribution methods and adversary infrastructure - SOCRadar
Dark Web Profile: Brain Cipher - SonicWall
The Hidden Danger of PDF Files with Embedded QR Codes - Taz Wake
Linux Incident Response – Sticky Bits, SUID and SGID. - The One Tracker
The One Tracker - Trend Micro
- Uptycs
UPCOMING EVENTS
- Black Hills Information Security
BHIS – Talkin’ Bout [infosec] News 2024-07-08 - Cyborg Security
Threat Hunting Workshop 11: Hunting for Command and Control - Magnet Forensics
- MSAB
XAMN Pro – “Turn the dials to 10 – Part 3” - SANS
Understanding Ransomware Threats to ESXi: Essential Insights
PRESENTATIONS/PODCASTS
- AhmedS Kasmani
- Belkasoft
Belkasoft Mobile Passcode Brute-Force Module (Turkish language) - Breaking Badness
Breaking Badness Cybersecurity Podcast – 189. Malware the Wild Things Are - Cellebrite
- Cloud Security Podcast by Google
EP179 Teamwork Under Stress: Expedition Behavior in Cybersecurity Incident Response - Cyber from the Frontlines
E14 Hunting BlackSuit TTPs - FIRST
Episode 45: Carson Zimmerman, Ardalyst, FIRSTCON24 Speaker - Hardly Adequate
- Huntress
How to talk to your clients about Incident Response plans | Community Fireside Chat - InfoSec_Bret
Challenge – PHP-CGI (CVE-2024-4577) - Jai Minton
MALWARE on a BLOCKCHAIN! | Malware Analysis of ClearFake hosed on hacked WordPress sites - Magnet Forensics
Mobile Forensics Images – Getting the Right Data - Microsoft Security Insights Show
Microsoft Security Insights Show Episode 216 – Just Us - MSAB
XAMN Pro Miniseries Part 9 – Working with tags - MyDFIR
- Paraben Corporation
E3 Google Authenticator for Cloud Data - SANS
- Security Conversations
Ep3: Dave Aitel joins debate on nation-state hacking responsibilities
MALWARE
- ASEC
- Baris Dincer
- Ricardo Pineda, Jr. and Arvin Bandong at G Data Security
Turla: A Master’s Art of Evasion - Arunkumar at K7 Labs
Kematian Stealer forked from PowerShell Token Grabber - Riley Porter and Mark Lim at Palo Alto Networks
Dissecting GootLoader With Node.js - Alex Delamotte at SentinelOne
CapraTube Remix | Transparent Tribe’s Android Spyware Targeting Gamers, Weapons Enthusiasts - Ben Martin at Sucuri
New Variation of WordFence Evasion Malware - System Weakness
- Zhassulan Zhussupov
Malware development trick 42: Stealing data via legit Discord Bot API. Simple C example. - ZScaler
A Brief History of SmokeLoader, Part 2
MISCELLANEOUS
- John Reeman at Cyooda Security
Creating an Effective Cyber Security Incident Response Plan - Elan at DFIR Diva
- Forensic Focus
- Nextron Systems
Cybersecurity is Not Just an IT Security Issue - Salvation DATA
- Security Onion
SOFTWARE UPDATES
- CCL Solutions
Shiny new Chrome tool now available - Datadog Security Labs
GuardDog v1.11.2 - Didier Stevens
Update: hash.py Version 0.0.13 - Digital Sleuth
winfor-salt v2024.10.12 - Federico Lagrasta
PersistenceSniper v1.16.1 - Ninoseki
Azuma v0.4.2 - OpenCTI
6.2.1 - WithSecure Labs
Chainsaw v2.9.1-2 - Xways
X-Ways Forensics 21.2 Beta 6
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!
Discover more from This Week In 4n6
Subscribe to get the latest posts sent to your email.