| Mobile Forensics Cheatsheet Mobile devices track vast amounts of user activity—often a goldmine of forensic evidence: – Device information – Application usage – Bluetooth and Wi-Fi connections – …and other events, often paired with timestamps Our cheatsheet categorizes these records and maps them to exact locations in iOS and Android extractions. Download Belkasoft’s free cheatsheet for mobile system artifacts |
| Sponsored by Belkasoft |
As always, thanks to those who give a little back for their support!
FORENSIC ANALYSIS
- Belkasoft
AI-Powered Picture Analysis with BelkaGPT - Oleg Afonin at Elcomsoft
Looks Can Lie: Is That Really an NVMe Drive? - Adam Hachem at Hexordia
- Kevin Pagano at Stark 4N6
BDC – More Battery Temps & Charging Stats for iOS - System Weakness
Tracking LockBit Through Memory Forensics.
THREAT INTELLIGENCE/HUNTING
- Andres Ramos at Arctic Wolf
CVE-2025-32975: Arctic Wolf Observes Exploitation of Quest KACE Systems Management Appliance - Armis
Nation-State Attacks Hit Machine Speed: Key Takeaways of the 2026 Armis Cyberwarfare Report and What it Means for Security Teams - ASEC
- Aurelien Chalot at Sensepost
From flat networks to locked up domains with tiering models - Avertium
CTA Campaign Assessment: The Iran Conflict – Global Cyber Operations Risk - CJ Moses at AWS
Amazon threat intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls - Christine Barry at Barracuda
Sandworm: Russia’s global infrastructure wrecking crew - Rebecca Harpur at BlackFog
LotAI: How Attackers Weaponize AI Assistants for Data Exfiltration - Brad Duncan at Malware Traffic Analysis
- Brian Krebs at ‘Krebs on Security’
Feds Disrupt IoT Botnets Behind Huge DDoS Attacks - Censys
- NetSupport Manager: Tracking Dual-Use Remote Administration Infrastructure
- Hunting Cameras in the Dark: Finding Internet Cameras Before Adversaries Do
- ResidentBat: Belarusian KGB Android Spyware at Internet Scale
- Vshell: A Chinese-Language Alternative to Cobalt Strike
- Odyssey Stealer: Inside a macOS Crypto-Stealing Operation
- CERT-AGID
Sintesi riepilogativa delle campagne malevole nella settimana del 14 – 20 marzo - Check Point
16th March – Threat Intelligence Report - Cisco’s Talos
- CloudSEK
- Cobi Aloia and Mark Deomampo at Cofense
LiveChat Abuse: How Phishers Are Exploiting SaaS Support Tools to Steal Sensitive Data - CrowdStrike
- Ctrl-Alt-Intel
FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops - Cyble
- AI-Assisted Phishing Campaign Exploits Browser Permissions to Capture Victim Data
- Middle East Cyber Warfare Intensifies: Rising Attacks, Hacktivist Surge, and Global Risk Exposure
- AI-Powered Cyber Warfare: How Autonomous Attack Agents Are Changing the Threat Landscape
- Inside Russia’s Shift to Credential-Based Intrusions: What CISOs Need to Know in 2026
- North Korea’s Crypto Theft Operations: The Role of Lazarus Group in State-Sponsored Financial Warfare
- Cyfirma
Weekly Intelligence Report – 20 March 2026 - Darktrace
Darktrace Identifies Encryption in a World Leaks Ransomware Attack - Detect FYI
- Disconinja
Weekly Threat Infrastructure Investigation(Week9,10) - Dzianis Skliar
Microsoft Graph API Attack Surface: OAuth Flows, Abused Endpoints, and What Defenders Miss - Eclypsium
New Malware Highlights Increased Systematic Targeting of Network Infrastructure - Elastic Security Labs
- FalconFeeds
- Flare
- Gen
- Genians
Analysis of the Spear-Phishing and KakaoTalk-Linked Threat Campaign by the Konni Group - Google Cloud Threat Intelligence
- Nikolay Kichatov, Pietro Albuquerque, Michael Perugia at Group-IB
Hasta la vista, Hastalamuerte: An Overview of The Gentlemen’s TTPs - Hunt IO
Iranian Botnet Exposed via Open Directory: 15-Node Relay Network and Active C2 - IC3
Government of Iran Cyber Actors Deploy Telegram C2 to Push Malware to Identified Targets - Infoblox
Inside Keitaro Abuse: A Persistent Stream of AI-Driven Investment Scams - InfoSec Write-ups
- DLL Search Order Hijacking: Finding and Exploiting the Flaw
- CTI Research: MuddyWater/Seedworm (Mango Sandstorm)
- ATT&CK as a Working Tool: Theory and Hands-On Practical Usage
- Infrastructure Pivoting: How CTI Analysts Expand From a Single IOC to a Full Attacker Network
- Ploutus Malware: Uptick in ATM jackpotting incidents prompts FBI warning
- Intel 471
Handala Threat Group - Thijs Xhaflaire at Jamf
GhostClaw expands beyond npm: GitHub repositories and AI workflows deliver macOS infostealer - Roy Paz at LayerX
Poisoned Typeface: How Simple Font Rendering Poisons Every AI Assistant, And Only Microsoft Cares - Lookout
Attackers Wielding DarkSword Threaten iOS Users - Microsoft Security
- MII Cyber Security
- Ryan LaSalle at Nisos
DPRK IT Worker Fraud: Hiring an Insider Threat - OpenSourceMalware
Four Arms, One Monster: GlassWorm Invades GitHub, NPM, VS Code and PyPI - Palo Alto Networks
- Picus Security
- T1071.001 Web Protocols in MITRE ATT&CK Explained
- T1059.013 Container CLI/API in MITRE ATT&CK Explained
- T1071.002 File Transfer Protocols in MITRE ATT&CK Explained
- T1071.003 Mail Protocols in MITRE ATT&CK Explained
- What Is Fileless Malware?
- T1219.001 IDE Tunneling in MITRE ATT&CK Explained
- T1071.005 Publish/Subscribe Protocols in MITRE ATT&CK Explained
- T1071.004 DNS in MITRE ATT&CK Explained
- T1219.002 Remote Desktop Software in MITRE ATT&CK Explained
- T1219.003 Remote Access Hardware in MITRE ATT&CK Explained
- T1547.001 Registry Run Keys/Start Up Folder in MITRE ATT&CK Explained
- Rachel Rabin, Anna Akselevich, and Stanislav Silberberg at Proofpoint
CursorJack: weaponizing Deeplinks to exploit Cursor IDE - Push Security
The Stryker breach didn’t match the playbook. That shouldn’t be a surprise. - Rapid7
The Attack Cycle is Accelerating: Announcing the Rapid7 2026 Global Threat Landscape Report - Raymond Roethof
Microsoft Orphaned Agents Identities: The hidden identity debt in your Entra tenant - Recorded Future
- Red Canary
- ReliaQuest
Casting a Wider Net: ClickFix, Deno, and LeakNet’s Scaling Threat - Robin Dost at Synaptic Systems
Observed Telegram Bot Naming Patterns in Recent MuddyWater Malware Activity - SANS Internet Storm Center
- David Greenwood at Sekoia
UEBA in the Real World: Catching Intrusions That Don’t Look Like Intrusions - Phil Stokes at SentinelOne
Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis - Simone Kraus
How Kinetic Strikes Opened the Door to Cyber and Influence War - Socket
- SOCRadar
Ransomware 3.0: The Autonomous Threat That Changed Everything - Sophos
Android devices ship with firmware-level malware - Spur
Detect Remote Worker Fraud Without Friction - Stairwell
- How to Prove Incident Containment: Evidence of Absence for Incident Response and the Board
- Stop Renting Your Own Malware Data Back: The Economics of Private Threat Intelligence
- Why Crowdsourced Threat Intel Leaks Your Advantage (And What to Do Instead)
- You Cannot Detect What You Did Not Keep: Why File Retention Is the Missing Security Control
- Continuous Malware Intelligence: Replacing Retro Hunts With Hindsight in Real Time
- Step Security
- Malicious Polymarket Bot Hides in Hijacked dev-protocol GitHub Org and Steals Wallet Keys
- Malicious npm Releases Found in Popular React Native Packages – 130K+ Monthly Downloads Compromised
- bittensor-wallet 4.0.2 Compromised on PyPI – Backdoor Exfiltrates Private Keys
- Trivy Compromised a Second Time – Malicious v0.69.4 Release
- Sublime Security
Advanced fake Zoom installer used for delivering malware · Blog · Sublime Security - Omer Kidron and Matan Naftali at Sygnia
One Commit Away from Theft: When Supply Chain Attacks Hit the Crypto Ecosystem - Symantec Enterprise
- Sysdig
- Will Thomas at Team Cymru
The Beast Returns: Analysis of a Beast Ransomware Server - The Hunter’s Ledger
ZeroTrace Multi-Family MaaS Operation — Open Directory Exposure at 74.0.42.25 - Third Eye intelligence
From Missiles to Malware — Part 2 Defending Against the Handala Campaign - ThreatFabric
Perseus: DTO malware that takes notes - Trellix
- Trend Micro
- nyxgeek at TrustedSec
Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass Found - Vectra AI
- Jakub Souček at WeLiveSecurity
EDR killers explained: Beyond the drivers - Rami McCarthy at Wiz
Trivy Compromised: Everything You Need to Know about the Latest Supply Chain Attack
UPCOMING EVENTS
- Black Hills Information Security
BHIS – Talkin’ Bout [infosec] News 2026-03-23 - Cellebrite
Advanced Digital Investigations in Africa: Unlocking the Evidence Hidden in Every Device - Cyber Triage
Investigating Evasion: How to Find What the Alert Missed - Magnet Forensics
Mobile Unpacked S4:E3 // Deducing the duplications: Understanding duplicated data in file systems - SANS
2026 Threat Landscape: Turning Threat Intelligence into Analytic Advantage
PRESENTATIONS/PODCASTS
- Alexis Brignoni
Digital Forensics Now Podcast S3 – 3 - Ayush Anand
Detect SSH -R Pivoting Before Ransomware Hits - Black Hat
- BlueMonkey 4n6
Magnet Virtual Summit – Capture The Flag – Feb 2026 – Android walk through - Cellebrite
- Cloud Security Podcast by Google
EP267 AI SOC or AI in a SOC? Cutting Through Hype, Pricing Models, and SIEM Detection Efficacy with Raffy Marty - Cyberwox
Cyber Threat Hunting at Scale: 4 Principles from the Trenches (Amazon Security Engineer) - Dr Josh Stroschein
02 – Exploring the Reverse Shell Source Code and API Breakdown - Huntress
Your Hidden Competition: Inside the Business of Modern Cybercrime - John Hammond
Bloodhound OpenGraph - Magnet Forensics
- Monolith Forensics
Updating Audit Item Statuses in Monolith Forensics - Mossé Cyber Security Institute
- MyDFIR
Cybersecurity SOC Analyst Lab – Malicious Browser Extension (FakeGPT) - Parsing The Truth: One Byte at a Time Podcast
S1 E43: Karen Read 1-3: Jessica Hyde Testimony Part 2 - Richard Davis at 13Cubed
Mac Imaging Made Easy with Fuji - SentinelOne
LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here - Team Cymru
- THE Security Insights Show
The “AI” Security Insights Show Episode 287 – Principal Cloud Advocate April Gittens. If AI is so smart, then why aren’t Robots doing our dishes! - The Weekly Purple Team
Is MotW Bypass Possible in 2026? - Three Buddy Problem
The greatest APT hunter of all time, Apple’s exploit kit problem, Microsoft FedRAMP mess
MALWARE
- Aikido
- BI.Zone
Forbidden Hyena adopts BlackReaperRAT in AI-powered campaigns - Raul Vasile Bucur and Silviu Stahie at Bitdefender
Windsurf IDE Extension Drops Malware via Solana Blockchain - Paula Januszkiewicz at CQURE Academy
CQURE Hacks #75: NTFS Forensics – Recovering Deleted Files and Analyzing MFT Records - Karsten Hahn at G Data Software
Sweet Minecraft Mods – The Dark Tale of SugarSMP Scam, Malware & Extortion - Rahul Ramesh at Howler Cell
Reverse Engineering .NET AOT Malware: A Guide to Trace the Multi-Stage Attack Chain with Binary Ninja - Praveen Babu at K7 Labs
Fake Telegram Malware Campaign: Analysis of a Multi-Stage Loader Delivered via Typosquatted Websites - Lotan Sery at Koi Security
GlassWorm Hits MCP: 5th Wave with New Delivery Techniques - Aayush Tyagi at McAfee Labs
AI Wrote This Malware: Dissecting the Insides of a Vibe-Coded Malware Campaign - Pierre-Henri Pezier at Nextron Systems
RegPhantom Backdoor Threat Analysis - Moshe Siman Tov Bustan and Nir Zadok at OX Security
OpenClaw Developers Targeted in Crypto-Wallet Phishing Attack - Axel Zengers at Plausible Deniablility
- Securelist
- Sathwik Ram Prakki at Seqrite
Operation GhostMail: Russian APT exploits Zimbra Webmail to Target Ukraine State Agency - Shubho57
- Tim Blazytko
Building a Pipeline for Agentic Malware Analysis - Zhassulan Zhussupov
- Muhammed Irfan V A at ZScaler
Technical Analysis of SnappyClient - Блог Solar 4RAYS
ClayRat: что это было?
MISCELLANEOUS
- Andrea Fortuna
Introducing DFIR Toolkit: Privacy-First DFIR utilities that run entirely in your browser - Brett Shavers
- Cellebrite
- Cellebrite Changes the Investigative Game with the Launch of Genesis, the Groundbreaking Agentic AI Solution for Making Our World Safer
- Guardian Cloud Platform IRAP Assessment: What Australian Investigators Need to Know
- Cellebrite Launches Guardian Investigate, the AI-Powered Nerve Center that Revolutionizes How Investigative Teams Close Cases
- From Weeks to Minutes: How Agentic AI Is Transforming Digital Investigations
- Why iOS Jailbreaking IsOver — And What That Means forSecurity Teams
- Will iOS 26 Cause Your MobileApp to Fail PCI Compliance?
- Future of Mobile Security TestingTools: The Latest New Corellium Products
- Daniel Koifman
My book, “A Dance of Red and Blue” is out! - Detections Wiki
Event catalog update: 17 March 2026 - Josibel Mendoza at DFIR Dominican
DFIR Jobs Update – 03/16/26 - Doug Metz at Baker Street Forensics
A Study in DFIR: Open-Source, Enterprise, and the Art of Analysis - Forensic Focus
- Digital Forensics Jobs Round-Up, March 16 2026
- GMDSOFT Tech Letter Vol19.App Artifact Analysis: Text Input Records
- JeongKyun Park, Information Security Student And Independent Developer, Korea Cyber University
- UPCOMING WEBINAR – Mastering Triage: Intro To ADF Pro
- Digital Forensics Round-Up, March 18 2026
- Introducing Aid4Mail: Closing Email Evidence Gaps for Investigators
- Rob Fried On New Challenges In Digital Forensics
- Forensic Focus Digest, March 20 2026
- Howard Oakley at ‘The Eclectic Light Company’
Explainer: Disk images - Magnet Forensics
- Magnet One Case Stream: A new transformative workflow amplifying critical work
- 숨겨진 데이터의 실체: Full File System추출을 통해 드러난 정보들
- A checklist for building a private-sector digital forensics lab
- Why human validation matters—and why fear doesn’t help
- We’re holding AI to a standard to which we’ve never held humans
- Shrinking the digital evidence haystack
- Matthew Plascencia
Phones Everywhere: How to Catch Them - MISP
- TobyG at sentinel.blog
Sentinel-As-Code: The 2026 Update
SOFTWARE UPDATES
- Alexandre Borges
Malwoverview 8.0.0 - Arkime
v6.1.0: Only show “Only Data Nodes” on EsNodes Stats tab (#3807) - Compass Security
From Enumeration to Findings: The Security Findings Report in EntraFalcon - Didier Stevens
Update: oledump.py Version 0.0.85 - Digital Sleuth
winfor-salt v2026.5.4 - k1nd0ne
VolWeb v3.16.0 - Kevin at Stark 4N6
Arc2Lite v2.0.0 – Combined Script - Lethal-Forensics
MacOS-Analyzer-Suite v1.2.0 - Mazars Tech
AD_Miner v1.9.0 - MISP
- OpenCTI
- Phil Harvey
ExifTool 13.53 - PowerForensics
PowerForensics Ecosystem - radare2
6.1.2 - Xways
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!
Discover more from This Week In 4n6
Subscribe to get the latest posts sent to your email.