| No sponsor this week. If your organisation is interested, head over here to find out more. |
As always, thanks to those who give a little back for their support!
FORENSIC ANALYSIS
- Chris at AskClees
Decrypting Threema4.db - Mike Wilkinson at Cyber Triage
Configuring Your System for IR: Windows Logging - Derek Eiri
Exploring frame-counts-galore and hashing pixel data - Oleg Afonin at Elcomsoft
Live System Analysis: Mitigating Interference from Antivirus Tools - Forensafe
Android Threema - Kenneth G Hartman at Lucid Truth Technologies
Android Evidence in Court: Why It’s Harder to Defend Than iPhone Evidence - Mahmoud Al-Qudsi at Neosmart Technologies
Recreating uncensored Epstein PDFs from raw encoded attachments - Faishol Hakim at MII Cyber Security
L3ak CTF — Forensic - Steve Whalen at Sumuri
Why macOS Artifacts Don’t Behave Like Windows Artifacts (And Never Will)
THREAT INTELLIGENCE/HUNTING
- Faan Rossouw at Active Countermeasures
The MITRE ATT&CK Framework: A Threat Hunter’s Strategic Compass - Adan Alvarez
A Practical Introduction to OpenTIDE: Open Threat-Informed Detection Engineering - Aikido
npx Confusion: Packages That Forgot to Claim Their Own Name - Andrew Skatoff at ‘DFIR TNT’
Introducing Huntable CTI Studio - Christine Barry at Barracuda
Lessons from Black Basta’s collapse - BI.Zone
Approaching cyclone: Vortex Werewolf attacks Russia - Bitdefender
- Rebecca Harpur at BlackFog
The State of Ransomware: January 2026 - Brad Duncan at Malware Traffic Analysis
- CERT Ukraine
“Бюлетень небезпеки”: UAC-0001 (APT28) здійснює кібератаки у відношенні України та країн ЄС з використанням експлойту CVE-2026-21509 (CERT-UA#19542) - CERT-AGID
- Check Point
- CloudSEK
Cross-Border Cryptocurrency Investment Scam Leveraging Social Messaging Channels and Fake Regulatory Credentials - Coveware
- CrowdStrike
Advanced Web Shell Detection and Prevention: A Deep Dive into CrowdStrike’s Linux Sensor Capabilities - Cybersec Sentinel
Notepad++ Compromise Reinforces the Need for Strict Software Governance - Cyble
Ransomware Attacks Have Surged 30% Since Q4 2025 - Cyfirma
Weekly Intelligence Report – 06 February 2026 - Damien Lewke
Claws for Concern - Ryan Simon at Datadog Security Labs
Web Traffic Hijacking: When Your Nginx Configuration Turns Malicious - Daylight Security
- Detect FYI
- Disconinja
Weekly Threat Infrastructure Investigation(Week4) - Elastic Security Labs
- Erik Hjelmvik at Netresec
njRAT runs MassLogger - Alexandros Pallis and Miltos Kalodoukas at Falcon Force
FalconFriday — Need for Speed: going Underground with near-real-time (NRT) rules — 0xFF26 - Assaf Morag at Flare
Threat Alert: TeamPCP, An Emerging Force in the Cloud Native and Ransomware Landscape - GreyNoise
- GreyNoise Labs
- Group-IB
Shaping Shadows: Breaking Down New ShadowSyndicate Methods and Infrastructure - HackTheBox
- Hudson Rock
AI Agents’ Most Downloaded Skill Is Discovered to Be an Infostealer - Hunt IO
Hunting OpenClaw Exposures: CVE-2026-25253 in Internet-Facing AI Agent Gateways - Huntress
- Infoblox
Compromised Routers, DNS, and a TDS Hidden in Aeza Networks - Intel 471
Likely fake ransomware operator 0APT causes panic — Our analysis - Jeffrey Appel
Automatic Windows event auditing configuration for Defender for Identity V3.x sensor - Jeffrey at Catching Phish
The Business of Being First After a Data Breach - Lab52
The GRU illegals - Microsoft Security
- Infostealers without borders: macOS, Python stealers, and platform abuse
- Detecting backdoored language models at scale
- New Clickfix variant ‘CrashFix’ deploying Python Remote Access Trojan
- The security implementation gap: Why Microsoft is supporting Operation Winter SHIELD
- Analysis of active exploitation of SolarWinds Web Help Desk
- Cloud forensics: Forensic readiness and incident response in Azure Virtual Desktop
- Moonlock
6 key trends to watch in macOS malware in 2026 - MuSecTech
Triage Analysis at Scale Using OpenSearch - Sydney Marrone at Nebulock
Hunting OpenClaw and Agentic AI Through Behavior - Ray Canzanese at Netskope
Malicious Bing Ads Lead to Widespread Azure Tech Support Scams - Ceri Coburn at NetSPI
Pipe Dreams: Remote Code Execution via Quest Desktop Authority Named Pipe - Oleg Skulkin at ‘Know Your Adversary’
372. The Notepad++ Supply Chain Attack: Detection and Hunting Opportunities - OpenSourceMalware
Malicious ClawHub Skills Use External Websites to Hide in Plain Sight (and bypass VirusTotal) - Palo Alto Networks
- Ian Ahl at Permiso
Inside the OpenClaw Ecosystem: What Happens When AI Agents Get Credentials to Everything - Picus Security
- Dhiral Vyas at Praetorian
Gone Phishing, Got a Token: When Separate Flaws Combine - Apurv Singh Gautam, Chaitanya Haritash, Eric Taylor, Ellis Stannard, and Olivier Ferrand at Ransom ISAC
Ransomware Leak Collection & Analysis - Ivan Feigl at Rapid7
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit - Recorded Future
Rublevka Team: Anatomy of a Russian Crypto Drainer Operation - Robin Dost at Synaptic Systems
APT28: Geofencing as a Targeting Signal (CVE-2026-21509 Campaign) - Tim Geschwindt at S-RM
Impostor ransomware actor 0APT triggers panic - SANS Internet Storm Center
- Georgy Kucherin and Anton Kargin at Securelist
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs - Security Joes
Hunting OpenClaw: Detection and Containment Guidance for Defenders - Akshay Gaikwad, Shikha Sangwan, and Aaron Beardslee at Securonix
Analyzing Dead#Vax: Analyzing Multi-Stage VHD Delivery and Self-Parsing Batch Scripts to Deploy In-Memory Shellcode - Seqrite
Inside a Multi-Stage Android Malware Campaign Leveraging RTO-Themed Social Engineering - Silent Push
Silent Push Identifies More Than 10,000 Infected IPs as Part of SystemBC Botnet Malware Family - SOCRadar
Dark Web Profile: 0APT Ransomware - Sophos
Malicious use of virtual machine infrastructure - Splunk
- Alex Hegyi at Stairwell
Stairwell Detects Widespread Exposure to Critical WinRAR Vulnerability Across Customer Environments - Kyle Eaton at Sublime Security
Scammers actively targeting real estate agents with remote access attacks · Blog · Sublime Security - Alon Eliassaf, Ronen Regev, and Amir Sadon at Sygnia
Inside a Sophisticated Recovery Scam Network: Evidence from a Live Investigation into Legal Services Impersonation - Symantec Enterprise
Black Basta: Defense Evasion Capability Embedded in Ransomware Payload - Noah Chaslin at Synacktiv
Beyond ACLs: Mapping Windows Privilege Escalation Paths with BloodHound - Alessandro Brucato and Michael Clark at Sysdig
AI-assisted cloud intrusion achieves admin access in 8 minutes - System Weakness
- Team Cymru
- The Raven File
LOGICAL LIMITATIONS OF AI MODELS IN THREAT INTELLIGENCE - Trellix
- Truesec
Russian Hacktivist Group “Russian Legion” Initiate OpDenmark - Ugur Koc and Bert-Jan Pals at Kusto Insights
Kusto Insights – January Update - Allison Nixon at Unit 221B
Harassment, Scare Tactics, & Why Victims Should Never Pay ShinyHunters - Kenneth Kinion and Elliot Roe at Valdin
Exploring the C2 Infrastructure of the Notepad++ Compromise - Bernardo Quintero at VirusTotalVirusTotal
- Gal Nagli at Wiz
Hacking Moltbook: The AI Social Network Any Human Can Control - Chloe Chamberland at Wordfence
Quarterly WordPress Threat Intelligence Report – Q4 2025 - YARA-X
Introducing the YARA language server - Блог Solar 4RAYS
Обзор уязвимостей веб-приложений за 4 квартал 2025 и полный 2025 год
UPCOMING EVENTS
- Black Hills Information Security
BHIS – Talkin’ Bout [infosec] News 2026-02-11 - Cellebrite
- Magnet Forensics
- Off By One Security
- Picus Security
The Silence of the Parasite: The New Art of Staying Undetected - SANS
Agile Incident Response: How Leading Teams Execute Fast - Spur
Suspicious Origins
PRESENTATIONS/PODCASTS
- Behind the Binary by Google Cloud Security
EP22 Jailbreaking, Prompt Injection, and the “Agentic” Flaw in MCP with Kevin Harris - Cellebrite
Tip Tuesday: Searching for Binary Objects - Erik Pistelli at Cerbero
Memory Challenge 16: MemLabs Lab 1 – Beginner’s Luck - Cloud Security Podcast by Google
EP261 No More Aspiration: Scaling a Modern SOC with Real AI Agents - Kajetan Porwolik at CQURE Academy
CQURE Hacks #71: 5 KQL tricks to speed up threat hunting - Dr Josh Stroschein
- Frank Victory
Digital Forensics Lab: Memory Analysis with Sysinternals & PowerShell (Part 1) - InfoSec_Bret
IR – SOC270 – AsyncRAT Malware Detected - John Hammond
- Magnet Forensics
- Michael Haggis
Build a Detection Engineering “Brain” for LLMs | Security Detections MCP 2.0 Release - Monolith Forensics
How to Use Global Search in Monolith - MSAB
#MSABMonday – XAMN Pro Report Builder - MyDFIR
I Wasted Hundreds on Separate Courses – Until I Found This All-in-One Solution - Parsing The Truth: One Byte at a Time Podcast
S1 E38: Printed Emails Aren’t Digital Evidence - Permiso Security
Episode 05 – OpenClaw, MoltBook, and the Rise of Agent Identity Abuse - The Weekly Purple Team
Cracking Credential Guard with DumpGuard
MALWARE
- Ashley Shen at Cisco’s Talos
Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework - Cybereason
Fake Installer: Ultimately, ValleyRAT infection - Darktrace
- Rahul Ramesh and Reegun Jayapaul at Howler Cell
RenEngine Loader and HijackLoader: Dual-Stage Attack Chain Fueling Stealer Campaigns - Guy Korolevski and Ofri Ouzan at JFrog
Breaking AppSec Myths – Obfuscated Packages - Alex and Oren Yomtov at Koi Security
ClawHavoc: 341 Malicious Clawed Skills Found by the Bot They Were Targeting - Lenny Zeltser
Using AI Agents to Analyze Malware on REMnux - Richard Christopher
- Securelist
Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT - Shubho57
Analysis of a JSE File (Kimsuky APT) - Aleksei Kudrinskii, Hemang Sarkar, Kristian Bonde Nielsen, Liran Tal, Luca Beurer-Kellner, and Marco Milanta at Snyk
280+ Leaky Skills: How OpenClaw & ClawHub Are Exposing API Keys and PII - Kush Pandya at Socket
Malicious dYdX Packages Published to npm and PyPI After Maintainer Compromise - VMRay
Climbing the Pyramid of Lumma Pain - Zhassulan Zhussupov
MacOS malware persistence 3: Dylib hijacking (VLC). Simple C example - ZScaler
- Шифровальщики-вымогатели The Digest “Crypto-Ransomware”
Sicari
MISCELLANEOUS
- Brett Shavers
I Thought Legal Would Catch It. They didn’t. - Cellebrite
- Decrypting a Defense
Federal Watchlists for Protesters, Ghost Gun Bogeyman, ALPR Virginia Court Decision, File Signatures and Carving & More - Fabian Mendoza at DFIR Dominican
DFIR Jobs Update – 02/02/26 - F-Response
Being Pushy – Deploying F-Response over the Network - Forensic Focus
- Digital Forensics Jobs Round-Up, February 02 2026
- Bridging The Gap In UAV Investigations: The Case For A 360-Degree Drone Forensics Curriculum
- How To Master Triage For Your Forensic Investigations
- Digital Forensics Round-Up, February 04 2026
- Occupational Trauma In Digital Forensics: What One Child’s Experience Reveals
- Forensic Focus Digest, February 06 2026
- Three Investigative Bottlenecks – Three New Baseline Capabilities
- Debbie Garner at Hexordia
Continuous Digital Forensics Training: The Non-Negotiable Investment - Kevin Pagano at Stark 4N6
Forensics StartMe Updates (February 2026) - Magnet Forensics
Revolutionizing digital forensics: How Magnet Automate is eliminating lab backlogs at scale - Patrick Siewert at ‘The Philosophy of DFIR’
An Exploration of the Grad School Decision in DF/IR
SOFTWARE UPDATES
- Arsenal Recon
Swap Recon v1.0.0.14 - Canadian Centre for Cyber Security
Assemblyline v4.7.0.stable4 - CyberChef
v10.21.0 - Datadog Security Labs
GuardDog Release v2.9.0 - Digital Sleuth
winfor-salt v2026.1.9 - Michael Karsyan at Event Log Explorer blog
Understanding Windows Events Made Easier: Event Log Explorer Meets Microsoft Copilot - IntelOwl
v6.5.1 - Magnet Forensics
New in Magnet Nexus: Deeper Windows evidence, faster macOS ARM collections - MSAB
XRY 11.3.1: Market-first GPS device support. - OpenCTI
6.9.16 - Phil Harvey
ExifTool 13.50 (production release) - PuffyCid
Artemis v0.18.0 – Released! - Ryan Benson at dfir.blog
Hindsight v2026.01 Released! - Xways
X-Ways Forensics 21.7 Beta 3
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!
Discover more from This Week In 4n6
Subscribe to get the latest posts sent to your email.