The DFIR Report
@thedfirreport.bsky.social
📤 1156
📥 0
📝 138
Real Intrusions by Real Attackers, the Truth Behind the Intrusion.
https://thedfirreport.com
reposted by
The DFIR Report
🎉 BLACK FRIDAY DEAL IS LIVE! 🎉 Now until December 1st, all swag in our store is 50% OFF — shirts, hoodies, and stickers, while supplies last! 🎁 Bonus: Every order comes with 2 FREE DFIR Report stickers! Don’t miss it — once it’s gone, it’s gone.
store.thedfirreport.com/collections/...
2 days ago
0
1
1
🎉 BLACK FRIDAY DEAL IS LIVE! 🎉 Now until December 1st, all swag in our store is 50% OFF — shirts, hoodies, and stickers, while supplies last! 🎁 Bonus: Every order comes with 2 FREE DFIR Report stickers! Don’t miss it — once it’s gone, it’s gone.
store.thedfirreport.com/collections/...
2 days ago
0
1
1
"Checking the registry and network traffic, we could identify ranges they scanned. They most likely ran several scans in Advanced IP scanner. We found evidence of scans for private IP ranges as well as multiple public IP ranges belonging to Microsoft and other entities..."
7 days ago
1
0
0
🐈 Cat’s Got Your Files: Lynx Ransomware 🎉New report out by @Friffnz, Daniel Casenove & @MittenSec!🎉 Attackers used stolen creds to access RDP, quickly pivoted to a DC with a second compromised admin, created impersonation accounts, mapped the environment, and more.
10 days ago
1
5
0
🎉New report out Monday 11/17 by @Friffnz, Daniel Casenove & @MittenSec! "Artifacts of this SMB enumeration were left behind in the smb.db database stored by NetExec in C:\Users\%UserProfile%\nxc\workspaces\smb.db. This database confirms that a number of domains... 1/2
10 days ago
1
2
0
🎉New report out Monday 11/17 by @Friffnz, Daniel Casenove & @MittenSec! "In this case, Netscan was run with domain administrator privileges, so all discovered shares were writable. As a result, NetScan was able to create and delete the delete[.]me file on each... 1/2
11 days ago
1
2
0
🎉New report out Monday 11/17 by @Friffnz, Daniel Casenove & @MittenSec! "On the domain controller, they used the "Active Directory Users and Computers" snap-in (dsa.msc) to create three users for persistence. All of the newly created accounts have usernames that mimic... 1/2
12 days ago
1
0
0
🎉New report out Monday 11/17 by @Friffnz, Daniel Casenove & @MittenSec! "The first instance of unauthorized access by the threat actor was a successful RDP logon to the beachhead host, a publicly exposed RDP server. The logon was performed using valid credentials, and... 1/3
13 days ago
1
1
0
"Checking the registry and network traffic, we could identify ranges they scanned. They most likely ran several scans in Advanced IP scanner. We found evidence of scans for private IP ranges as well as multiple public IP ranges belonging to Microsoft and other entities..."
about 1 month ago
1
1
0
We identified a malvertising campaign targeting users searching for legitimate software, leading to the download of a trojanized WinSCP installer that deployed Broomstick/OysterLoader. All files involved in the initial access phase were signed with valid certificates.
about 1 month ago
1
2
1
DFIR Challenge Weekend Recap! The challenge is complete! A massive thank you to everyone who participated in our latest DFIR Challenge! Big shoutout to the top finishers who untangled the whole thing: 🥇 Jason Phang Vern Onn 🥈 Marko Yavorskyi 🥉 Bohdan Hrondzal
about 2 months ago
1
0
0
🌟New report out today!🌟 From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion Analysis/reporting completed by @RussianPanda, Christos Fotopoulos, Salem Salem, reviewed by @svch0st. Audio: Available on Spotify, Apple, YouTube and more! Report:⬇️
about 2 months ago
1
0
0
"Once the victim uncompressed the zip, they clicked the Windows Shortcut file John-_Shimkus.lnk which executed the infection flow. Of note, the image 2.jpg that was alongside the payload in the .zip was not used by the malware. We assess that it was likely used to “pad” the..."
2 months ago
1
1
0
"Two of the binaries observed in this attack were masquerading as products from well-known and reputable security vendors. The first binary, GT_NET.exe is associated with Grixba, a custom data-gathering tool used by the Play ransomware group. Its metadata was crafted to..."
2 months ago
1
3
0
"The Zoom installer was created using Inno Setup, a free installer for Windows programs, and served as the delivery mechanism for a multi-stage malware deployment and execution chain. The trojanized installer was a downloader, more publicly known as “d3f@ckloader”, and is..."
2 months ago
1
0
0
"On the eleventh day, the threat actor began a ransomware deployment. This final stage included the preparatory steps to deploy across the network. The process started with the execution of a batch script named SETUP.bat, which created a staging file share..."
2 months ago
2
3
0
"On the second day of the intrusion, Confluence was exploited multiple times over a roughly twenty-minute period from the IP address 109.160.16[.]68. No link was found from this IP to the other activity detailed so far in the report leading us to assess this was likely a ..."
2 months ago
1
0
0
🌟New report out today!🌟 Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs Analysis and reporting completed by @r3nzsec, @EncapsulateJ, @rkonicekr, & Adam Rowe Audio: Available on Spotify, Apple, YouTube and more! Report:⬇️
3 months ago
1
2
0
🚨 New Lab Just Released: Specter’s Domain Heist – Private Case #35218 This lab is based on a detailed intrusion from our private case repositories 👇 📥 Workstation Compromise ➡️ Persistent Access ➡️ Discovery➡️ Privilege Escalation ➡️ Lateral Movement ➡️ Data Exfil Link 👇
3 months ago
1
1
1
🚨 Search for software, end up getting ransomware! SEO-driven
#Bumblebee
malware campaigns observed throughout July led to domain compromise, data theft &
#Akira
ransomware. Tools included
#AdaptixC2
&
#Netscan
.
thedfirreport.com/2025/08/05/f...
loading . . .
From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira
Overview Bumblebee malware has been an initial access tool used by threat actors since late 2021. In 2023 the malware was first reported as using SEO poisoning as a delivery mechanism. Recently in …
https://thedfirreport.com/2025/08/05/from-bing-search-to-ransomware-bumblebee-and-adaptixc2-deliver-akira/
4 months ago
0
3
1
🚨 New: DFIR Labs Pro Tier is here! 🎯 Smarter investigations with: • 🧠 AI Timeline Builder (w/ IOCs + notes) • ⏱️ More lab time + extension credits • 📊 Analytics dashboard w/ tailored insights 🔗 Dive in:
dfirlabs.thedfirreport.com/subscription...
loading . . .
DFIR Labs - Subscription Plans
https://dfirlabs.thedfirreport.com/subscription-plans
4 months ago
0
3
2
🚨 New Interlock RAT variant spotted! Researchers from The DFIR Report, in partnership with Proofpoint, have identified a new and resilient variant of the Interlock ransomware group’s remote access trojan (RAT). 🔎
thedfirreport.com/2025/07/14/k...
#DFIR
#KongTuke
#InterlockRAT
#FileFix
loading . . .
KongTuke FileFix Leads to New Interlock RAT Variant
Researchers from The DFIR Report, in partnership with Proofpoint, have identified a new and resilient variant of the Interlock ransomware group’s remote access trojan (RAT). This new malware,…
https://thedfirreport.com/2025/07/14/kongtuke-filefix-leads-to-new-interlock-rat-variant/
5 months ago
0
2
2
reposted by
The DFIR Report
📢DFIR Labs Enterprise Forensics Challenge📢 🔹 When: Aug 30, 2025 (14:00-18:00 UTC) 🔹 SIEM: Azure Log Analytics, Elastic, or Splunk 🔹 Teams: 2-3 analysts 🔹 Prizes: Top team wins! 🏆 Limited spots available. Register Now:
dfirlabs.thedfirreport.com/dfirchalleng...
loading . . .
DFIR Labs - Digital Forensics Challenge - Enterprise Edition
https://dfirlabs.thedfirreport.com/dfirchallenge-enterprise-edition
5 months ago
0
2
1
🌟New report out today!🌟 Hide Your RDP: Password Spray Leads to RansomHub Deployment Analysis and reporting completed by @tas_kmanager, @iiamaleks and UC2 🔊Audio: Available on Spotify, Apple, YouTube and more!
thedfirreport.com/2025/06/30/h...
loading . . .
Hide Your RDP: Password Spray Leads to RansomHub Deployment
Key Takeaways Initial access was via a password spray attack against an exposed RDP server, targeting numerous accounts over a four-hour period. Mimikatz and Nirsoft were used to harvest credential…
https://thedfirreport.com/2025/06/30/hide-your-rdp-password-spray-leads-to-ransomhub-deployment/
5 months ago
0
3
2
A New DFIR Lab is out: The Hive Ransomware Fail 🐝 A domain is under siege, can you trace the threat actor's steps? Sharpen your triage and lateral movement skills in this hands-on investigation. ➡️Difficulty: Easy 1/2
5 months ago
1
4
1
🔎 We're Hiring: Senior Security Analyst We're looking for a full-time Senior Security Analyst with a passion for dissecting intrusions and translating technical findings into actionable insights. Check out the full job description and apply here 👉
forms.office.com/r/87y8wAp3gA
loading . . .
Microsoft Forms
https://forms.office.com/r/87y8wAp3gA
5 months ago
0
1
2
📢DFIR Labs Enterprise Forensics Challenge📢 🔹 When: Aug 30, 2025 (14:00-18:00 UTC) 🔹 SIEM: Azure Log Analytics, Elastic, or Splunk 🔹 Teams: 2-3 analysts 🔹 Prizes: Top team wins! 🏆 Limited spots available. Register Now:
dfirlabs.thedfirreport.com/dfirchalleng...
loading . . .
DFIR Labs - Digital Forensics Challenge - Enterprise Edition
https://dfirlabs.thedfirreport.com/dfirchallenge-enterprise-edition
5 months ago
0
2
1
🎉 Huge News from DFIR Labs: Subscriptions are Here! 🎉 We're thrilled to announce that subscriptions are officially LIVE and we’re proud of what this means for the DFIR community 💙 1/5
5 months ago
1
1
1
🎉New DFIR Discussions Episode🎉 🔊Available on Spotify, Apple, & YouTube! 🎙️ We dive into our latest public report with Randy Pargman, Jake Ouellette, Kostas T., and Mangatas Tondang. Check it out and let us know what you think!
open.spotify.com/episode/1SKP...
loading . . .
DFIR Discussions: Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware
Reports · Episode
https://open.spotify.com/episode/1SKPWFNSPqlbHyCle3AQpY?si=G8NsubLST8-CpgatfDbTZg
5 months ago
0
1
1
⚔️Registration for the DFIR Labs Enterprise CTF is now LIVE! ⚔️ Assemble your elite SOC/IR team (up to 3 members) for a 4-hour competition to prove you're the best in the industry. Win prizes, bragging rights, and glory! 🏆 Register now! 👉https://form.jotform.com/251605321344245
6 months ago
0
1
0
🎙️ New Podcast Episode Dropping Soon! We dive into our latest public report with Randy Pargman, Jake Ouellette, Kostas T., and Mangatas Tondang. Stay tuned for deep insights, behind-the-scenes analysis, and expert commentary from the front lines of DFIR. 🔍
loading . . .
6 months ago
1
2
1
🚨 That CTF finale was wild. Only 300 points between 1st and 3rd — it stayed neck-and-neck till the very last minute. Big congrats to our winners! 🥇 @Friffnz — 5100 pts 🥈 snail — 4840 pts 🥉 forynsics — 4800 pts
6 months ago
1
0
0
🚨 CTF is starting soon!🚨 Don't Miss the DFIR Labs CTF - Registration Still Open! ➡️When: Today, June 7th | 16:30–20:30 UTC ➡️➡️Register:
dfirlabs.thedfirreport.com/ctf
add a skeleton here at some point
6 months ago
0
0
0
reposted by
The DFIR Report
Kostas
6 months ago
/1 🚨 𝐂𝐓𝐅 𝐤𝐢𝐜𝐤𝐬 𝐨𝐟𝐟 𝐢𝐧 𝐥𝐞𝐬𝐬 𝐭𝐡𝐚𝐧 48𝐡 - 𝐚𝐧𝐝 𝐭𝐡𝐢𝐬 𝐨𝐧𝐞’𝐬 𝐛𝐢𝐠. One of the most involved cases we’ve ever made available to the public. You’ll be diving into an intrusion that hit 18 hosts, including: ➡️ Domain Controllers ➡️ Backup Servers ➡️ Hypervisors ➡️ RDP Servers (Guess the initial access gonna be? 😏)
1
0
2
"The remote endpoints it attempted to contact included several TryCloudflare domains as well as direct IP addresses. The logic would rotate through the various servers until an online host was found. 1/3
#dfir
#CyberSecurity
#cyberthreatintelligence
#cti
#interlock
#ransomware
6 months ago
1
0
0
🎯 THIS SATURDAY: DFIR Labs CTF 🎯 ⏰ June 7 | 1630–2030 UTC 🔗 Register Now →
dfirlabs.thedfirreport.com/ctf
🚀 DFIR Labs CTF is back! 💥 Only $9.99 to join 💥 Choose Elastic or Splunk 💥 Access a brand-new, unreleased case 💥 Top 5 get invited to join The DFIR Report team!
6 months ago
0
0
2
We had a blast speaking at the Ransomware Summit! 🎤💥 Huge thanks to everyone involved! 🎥 Missed our keynote? No worries — you can catch the full session here: 👉
www.youtube.com/live/nhB-xkm...
6 months ago
0
2
0
🔥 DFIR Labs is Evolving! Have You Seen What's New? 🔥 Big things are happening at DFIR Labs! We've been hard at work implementing a wave of exciting changes and improvements, all designed to enhance your experience! ➡️ Check it out now!
dfirlabs.thedfirreport.com
6 months ago
0
3
2
"Analysis of command-line activity reveals the threat actor’s use of specific PowerShell cmdlets for discovering and interacting with virtual machines. 1/4
6 months ago
1
0
0
reposted by
The DFIR Report
Randy
6 months ago
thedfirreport.com/2025/05/19/a...
It was fun working on this Report with
@pcsc0ut.bsky.social
&& 0xtornado. I hope my
#threathunting
friends will find it helpful. We came up with a new detection for Impacket tools in this investigation
0
4
2
🌟New report out today!🌟 Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware Analysis and reporting completed by
@pcsc0ut.bsky.social
,
@irishdeath.bsky.social
& @0xtornado 🔊Audio: Available on Spotify, Apple, YouTube and more!
thedfirreport.com/2025/05/19/a...
loading . . .
Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware
Key Takeaways The threat actor first gained entry by exploiting a known vulnerability (CVE-2023-22527) on an internet-facing Confluence server, allowing for remote code execution. Using this access…
https://thedfirreport.com/2025/05/19/another-confluence-bites-the-dust-falling-to-elpaco-team-ransomware/
6 months ago
0
10
4
reposted by
The DFIR Report
📉DFIR Labs Weekend Discount📉 Use this discount code to receive 10% off all DFIR Labs cases! Discount expires May 5th 04:00 UTC ⏲️Buy now, use anytime over the next 3 months. ➡️Discount code: WeekendDiscount20250502 Access DFIR Labs:
store.thedfirreport.com/collections/...
loading . . .
DFIR Labs
Explore Real-World Cybersecurity Intrusions with Our Interactive DFIR Labs Our cloud-based DFIR (Digital Forensics and Incident Response) Labs offer a hands-on learning experience, using real data fro...
https://store.thedfirreport.com/collections/dfir-labs
7 months ago
0
0
1
📉DFIR Labs Weekend Discount📉 Use this discount code to receive 10% off all DFIR Labs cases! Discount expires May 5th 04:00 UTC ⏲️Buy now, use anytime over the next 3 months. ➡️Discount code: WeekendDiscount20250502 Access DFIR Labs:
store.thedfirreport.com/collections/...
loading . . .
DFIR Labs
Explore Real-World Cybersecurity Intrusions with Our Interactive DFIR Labs Our cloud-based DFIR (Digital Forensics and Incident Response) Labs offer a hands-on learning experience, using real data fro...
https://store.thedfirreport.com/collections/dfir-labs
7 months ago
0
0
1
Wondering how effective our DFIR Labs are for practical skills? 🤔 Check out real user testimonials on gaining critical, hands-on experience & see why they recommend our platform: 👇
thedfirreport.com/services/dfi...
7 months ago
0
1
1
🌟New report out today!🌟 Navigating Through The Fog Analysis and reporting completed by Angelo Violetti, and reviewed by Zach Stanford. Audio: Available on Spotify, Apple, YouTube and more!
thedfirreport.com/2025/04/28/n...
loading . . .
Navigating Through The Fog
Key Takeaways An open directory associated with a ransomware affiliate, likely linked to the Fog ransomware group, was discovered in December 2024. It contained tools and scripts for reconnaissance…
https://thedfirreport.com/2025/04/28/navigating-through-the-fog/
7 months ago
0
1
1
⏳We'll be selecting the date(s) for our inaugural Enterprise CTF very soon! ➡️If you're interested, please fill out this form by April 28th -
forms.office.com/r/XhBg4p8i4q
🆕Choose between Azure Log Analytics, Splunk and Elastic!
7 months ago
0
1
0
Thank you to everyone who has submitted their reports so far! We're already seeing some excellent candidates and appreciate you getting these in promptly. For those still working, please note this is the last weekend before the deadline on Monday, April 21st.
add a skeleton here at some point
7 months ago
0
1
0
Passionate about Digital Forensics and Incident Response? Want to share your expertise with the security community while collaborating with talented analysts worldwide? We're looking for volunteer analysts to join the team! Ready to join the team? ➡️https://github.com/The-DFIR-Report/DFIR-Artifacts
8 months ago
0
5
3
reposted by
The DFIR Report
Want to join a team of amazing volunteer DFIR analysts? Ready to collaborate with us and leave your mark on the DFIR industry? Come join our team! We've updated our repo with a new report template and the graphics we commonly use. Apply today!👉
github.com/The-DFIR-Rep...
loading . . .
GitHub - The-DFIR-Report/DFIR-Artifacts: Repository for sharing examples of our artifacts data and for use in new analyst recruitment.
Repository for sharing examples of our artifacts data and for use in new analyst recruitment. - The-DFIR-Report/DFIR-Artifacts
https://github.com/The-DFIR-Report/DFIR-Artifacts
8 months ago
0
4
2
“For this case we observed TXT records being utilized for C2 communication rather than MX records. This can be identified by the "type: 16" in the Sysmon logs seen above. Below is a sample list that, while not exhaustive, provides a clear example of the traffic patterns:” 1/2
8 months ago
1
5
0
Load more
feeds!
log in