The DFIR Report
@thedfirreport.bsky.social
📤 1137
📥 0
📝 120
Real Intrusions by Real Attackers, the Truth Behind the Intrusion.
https://thedfirreport.com
We identified a malvertising campaign targeting users searching for legitimate software, leading to the download of a trojanized WinSCP installer that deployed Broomstick/OysterLoader. All files involved in the initial access phase were signed with valid certificates.
1 day ago
1
2
1
DFIR Challenge Weekend Recap! The challenge is complete! A massive thank you to everyone who participated in our latest DFIR Challenge! Big shoutout to the top finishers who untangled the whole thing: 🥇 Jason Phang Vern Onn 🥈 Marko Yavorskyi 🥉 Bohdan Hrondzal
18 days ago
1
0
0
🌟New report out today!🌟 From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion Analysis/reporting completed by @RussianPanda, Christos Fotopoulos, Salem Salem, reviewed by @svch0st. Audio: Available on Spotify, Apple, YouTube and more! Report:⬇️
18 days ago
1
0
0
"Once the victim uncompressed the zip, they clicked the Windows Shortcut file John-_Shimkus.lnk which executed the infection flow. Of note, the image 2.jpg that was alongside the payload in the .zip was not used by the malware. We assess that it was likely used to “pad” the..."
24 days ago
1
1
0
"Two of the binaries observed in this attack were masquerading as products from well-known and reputable security vendors. The first binary, GT_NET.exe is associated with Grixba, a custom data-gathering tool used by the Play ransomware group. Its metadata was crafted to..."
25 days ago
1
3
0
"The Zoom installer was created using Inno Setup, a free installer for Windows programs, and served as the delivery mechanism for a multi-stage malware deployment and execution chain. The trojanized installer was a downloader, more publicly known as “d3f@ckloader”, and is..."
26 days ago
1
0
0
"On the eleventh day, the threat actor began a ransomware deployment. This final stage included the preparatory steps to deploy across the network. The process started with the execution of a batch script named SETUP.bat, which created a staging file share..."
27 days ago
2
3
0
"On the second day of the intrusion, Confluence was exploited multiple times over a roughly twenty-minute period from the IP address 109.160.16[.]68. No link was found from this IP to the other activity detailed so far in the report leading us to assess this was likely a ..."
28 days ago
1
0
0
🌟New report out today!🌟 Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs Analysis and reporting completed by @r3nzsec, @EncapsulateJ, @rkonicekr, & Adam Rowe Audio: Available on Spotify, Apple, YouTube and more! Report:⬇️
about 1 month ago
1
2
0
🚨 New Lab Just Released: Specter’s Domain Heist – Private Case #35218 This lab is based on a detailed intrusion from our private case repositories 👇 📥 Workstation Compromise ➡️ Persistent Access ➡️ Discovery➡️ Privilege Escalation ➡️ Lateral Movement ➡️ Data Exfil Link 👇
about 1 month ago
1
1
1
🚨 Search for software, end up getting ransomware! SEO-driven
#Bumblebee
malware campaigns observed throughout July led to domain compromise, data theft &
#Akira
ransomware. Tools included
#AdaptixC2
&
#Netscan
.
thedfirreport.com/2025/08/05/f...
loading . . .
From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira
Overview Bumblebee malware has been an initial access tool used by threat actors since late 2021. In 2023 the malware was first reported as using SEO poisoning as a delivery mechanism. Recently in …
https://thedfirreport.com/2025/08/05/from-bing-search-to-ransomware-bumblebee-and-adaptixc2-deliver-akira/
2 months ago
0
3
1
🚨 New: DFIR Labs Pro Tier is here! 🎯 Smarter investigations with: • 🧠 AI Timeline Builder (w/ IOCs + notes) • ⏱️ More lab time + extension credits • 📊 Analytics dashboard w/ tailored insights 🔗 Dive in:
dfirlabs.thedfirreport.com/subscription...
loading . . .
DFIR Labs - Subscription Plans
https://dfirlabs.thedfirreport.com/subscription-plans
3 months ago
0
3
2
🚨 New Interlock RAT variant spotted! Researchers from The DFIR Report, in partnership with Proofpoint, have identified a new and resilient variant of the Interlock ransomware group’s remote access trojan (RAT). 🔎
thedfirreport.com/2025/07/14/k...
#DFIR
#KongTuke
#InterlockRAT
#FileFix
loading . . .
KongTuke FileFix Leads to New Interlock RAT Variant
Researchers from The DFIR Report, in partnership with Proofpoint, have identified a new and resilient variant of the Interlock ransomware group’s remote access trojan (RAT). This new malware,…
https://thedfirreport.com/2025/07/14/kongtuke-filefix-leads-to-new-interlock-rat-variant/
3 months ago
0
2
2
reposted by
The DFIR Report
📢DFIR Labs Enterprise Forensics Challenge📢 🔹 When: Aug 30, 2025 (14:00-18:00 UTC) 🔹 SIEM: Azure Log Analytics, Elastic, or Splunk 🔹 Teams: 2-3 analysts 🔹 Prizes: Top team wins! 🏆 Limited spots available. Register Now:
dfirlabs.thedfirreport.com/dfirchalleng...
loading . . .
DFIR Labs - Digital Forensics Challenge - Enterprise Edition
https://dfirlabs.thedfirreport.com/dfirchallenge-enterprise-edition
4 months ago
0
2
1
🌟New report out today!🌟 Hide Your RDP: Password Spray Leads to RansomHub Deployment Analysis and reporting completed by @tas_kmanager, @iiamaleks and UC2 🔊Audio: Available on Spotify, Apple, YouTube and more!
thedfirreport.com/2025/06/30/h...
loading . . .
Hide Your RDP: Password Spray Leads to RansomHub Deployment
Key Takeaways Initial access was via a password spray attack against an exposed RDP server, targeting numerous accounts over a four-hour period. Mimikatz and Nirsoft were used to harvest credential…
https://thedfirreport.com/2025/06/30/hide-your-rdp-password-spray-leads-to-ransomhub-deployment/
4 months ago
0
3
2
A New DFIR Lab is out: The Hive Ransomware Fail 🐝 A domain is under siege, can you trace the threat actor's steps? Sharpen your triage and lateral movement skills in this hands-on investigation. ➡️Difficulty: Easy 1/2
4 months ago
1
4
1
🔎 We're Hiring: Senior Security Analyst We're looking for a full-time Senior Security Analyst with a passion for dissecting intrusions and translating technical findings into actionable insights. Check out the full job description and apply here 👉
forms.office.com/r/87y8wAp3gA
loading . . .
Microsoft Forms
https://forms.office.com/r/87y8wAp3gA
4 months ago
0
1
2
📢DFIR Labs Enterprise Forensics Challenge📢 🔹 When: Aug 30, 2025 (14:00-18:00 UTC) 🔹 SIEM: Azure Log Analytics, Elastic, or Splunk 🔹 Teams: 2-3 analysts 🔹 Prizes: Top team wins! 🏆 Limited spots available. Register Now:
dfirlabs.thedfirreport.com/dfirchalleng...
loading . . .
DFIR Labs - Digital Forensics Challenge - Enterprise Edition
https://dfirlabs.thedfirreport.com/dfirchallenge-enterprise-edition
4 months ago
0
2
1
🎉 Huge News from DFIR Labs: Subscriptions are Here! 🎉 We're thrilled to announce that subscriptions are officially LIVE and we’re proud of what this means for the DFIR community 💙 1/5
4 months ago
1
1
1
🎉New DFIR Discussions Episode🎉 🔊Available on Spotify, Apple, & YouTube! 🎙️ We dive into our latest public report with Randy Pargman, Jake Ouellette, Kostas T., and Mangatas Tondang. Check it out and let us know what you think!
open.spotify.com/episode/1SKP...
loading . . .
DFIR Discussions: Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware
Reports · Episode
https://open.spotify.com/episode/1SKPWFNSPqlbHyCle3AQpY?si=G8NsubLST8-CpgatfDbTZg
4 months ago
0
1
1
⚔️Registration for the DFIR Labs Enterprise CTF is now LIVE! ⚔️ Assemble your elite SOC/IR team (up to 3 members) for a 4-hour competition to prove you're the best in the industry. Win prizes, bragging rights, and glory! 🏆 Register now! 👉https://form.jotform.com/251605321344245
4 months ago
0
1
0
🎙️ New Podcast Episode Dropping Soon! We dive into our latest public report with Randy Pargman, Jake Ouellette, Kostas T., and Mangatas Tondang. Stay tuned for deep insights, behind-the-scenes analysis, and expert commentary from the front lines of DFIR. 🔍
loading . . .
4 months ago
1
2
1
🚨 That CTF finale was wild. Only 300 points between 1st and 3rd — it stayed neck-and-neck till the very last minute. Big congrats to our winners! 🥇 @Friffnz — 5100 pts 🥈 snail — 4840 pts 🥉 forynsics — 4800 pts
4 months ago
1
0
0
🚨 CTF is starting soon!🚨 Don't Miss the DFIR Labs CTF - Registration Still Open! ➡️When: Today, June 7th | 16:30–20:30 UTC ➡️➡️Register:
dfirlabs.thedfirreport.com/ctf
add a skeleton here at some point
4 months ago
0
0
0
reposted by
The DFIR Report
Kostas
4 months ago
/1 🚨 𝐂𝐓𝐅 𝐤𝐢𝐜𝐤𝐬 𝐨𝐟𝐟 𝐢𝐧 𝐥𝐞𝐬𝐬 𝐭𝐡𝐚𝐧 48𝐡 - 𝐚𝐧𝐝 𝐭𝐡𝐢𝐬 𝐨𝐧𝐞’𝐬 𝐛𝐢𝐠. One of the most involved cases we’ve ever made available to the public. You’ll be diving into an intrusion that hit 18 hosts, including: ➡️ Domain Controllers ➡️ Backup Servers ➡️ Hypervisors ➡️ RDP Servers (Guess the initial access gonna be? 😏)
1
0
2
"The remote endpoints it attempted to contact included several TryCloudflare domains as well as direct IP addresses. The logic would rotate through the various servers until an online host was found. 1/3
#dfir
#CyberSecurity
#cyberthreatintelligence
#cti
#interlock
#ransomware
4 months ago
1
0
0
🎯 THIS SATURDAY: DFIR Labs CTF 🎯 ⏰ June 7 | 1630–2030 UTC 🔗 Register Now →
dfirlabs.thedfirreport.com/ctf
🚀 DFIR Labs CTF is back! 💥 Only $9.99 to join 💥 Choose Elastic or Splunk 💥 Access a brand-new, unreleased case 💥 Top 5 get invited to join The DFIR Report team!
5 months ago
0
0
2
We had a blast speaking at the Ransomware Summit! 🎤💥 Huge thanks to everyone involved! 🎥 Missed our keynote? No worries — you can catch the full session here: 👉
www.youtube.com/live/nhB-xkm...
5 months ago
0
2
0
🔥 DFIR Labs is Evolving! Have You Seen What's New? 🔥 Big things are happening at DFIR Labs! We've been hard at work implementing a wave of exciting changes and improvements, all designed to enhance your experience! ➡️ Check it out now!
dfirlabs.thedfirreport.com
5 months ago
0
3
2
"Analysis of command-line activity reveals the threat actor’s use of specific PowerShell cmdlets for discovering and interacting with virtual machines. 1/4
5 months ago
1
0
0
reposted by
The DFIR Report
Randy
5 months ago
thedfirreport.com/2025/05/19/a...
It was fun working on this Report with
@pcsc0ut.bsky.social
&& 0xtornado. I hope my
#threathunting
friends will find it helpful. We came up with a new detection for Impacket tools in this investigation
0
4
2
🌟New report out today!🌟 Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware Analysis and reporting completed by
@pcsc0ut.bsky.social
,
@irishdeath.bsky.social
& @0xtornado 🔊Audio: Available on Spotify, Apple, YouTube and more!
thedfirreport.com/2025/05/19/a...
loading . . .
Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware
Key Takeaways The threat actor first gained entry by exploiting a known vulnerability (CVE-2023-22527) on an internet-facing Confluence server, allowing for remote code execution. Using this access…
https://thedfirreport.com/2025/05/19/another-confluence-bites-the-dust-falling-to-elpaco-team-ransomware/
5 months ago
0
10
4
reposted by
The DFIR Report
📉DFIR Labs Weekend Discount📉 Use this discount code to receive 10% off all DFIR Labs cases! Discount expires May 5th 04:00 UTC ⏲️Buy now, use anytime over the next 3 months. ➡️Discount code: WeekendDiscount20250502 Access DFIR Labs:
store.thedfirreport.com/collections/...
loading . . .
DFIR Labs
Explore Real-World Cybersecurity Intrusions with Our Interactive DFIR Labs Our cloud-based DFIR (Digital Forensics and Incident Response) Labs offer a hands-on learning experience, using real data fro...
https://store.thedfirreport.com/collections/dfir-labs
6 months ago
0
0
1
📉DFIR Labs Weekend Discount📉 Use this discount code to receive 10% off all DFIR Labs cases! Discount expires May 5th 04:00 UTC ⏲️Buy now, use anytime over the next 3 months. ➡️Discount code: WeekendDiscount20250502 Access DFIR Labs:
store.thedfirreport.com/collections/...
loading . . .
DFIR Labs
Explore Real-World Cybersecurity Intrusions with Our Interactive DFIR Labs Our cloud-based DFIR (Digital Forensics and Incident Response) Labs offer a hands-on learning experience, using real data fro...
https://store.thedfirreport.com/collections/dfir-labs
6 months ago
0
0
1
Wondering how effective our DFIR Labs are for practical skills? 🤔 Check out real user testimonials on gaining critical, hands-on experience & see why they recommend our platform: 👇
thedfirreport.com/services/dfi...
6 months ago
0
1
1
🌟New report out today!🌟 Navigating Through The Fog Analysis and reporting completed by Angelo Violetti, and reviewed by Zach Stanford. Audio: Available on Spotify, Apple, YouTube and more!
thedfirreport.com/2025/04/28/n...
loading . . .
Navigating Through The Fog
Key Takeaways An open directory associated with a ransomware affiliate, likely linked to the Fog ransomware group, was discovered in December 2024. It contained tools and scripts for reconnaissance…
https://thedfirreport.com/2025/04/28/navigating-through-the-fog/
6 months ago
0
1
1
⏳We'll be selecting the date(s) for our inaugural Enterprise CTF very soon! ➡️If you're interested, please fill out this form by April 28th -
forms.office.com/r/XhBg4p8i4q
🆕Choose between Azure Log Analytics, Splunk and Elastic!
6 months ago
0
1
0
Thank you to everyone who has submitted their reports so far! We're already seeing some excellent candidates and appreciate you getting these in promptly. For those still working, please note this is the last weekend before the deadline on Monday, April 21st.
add a skeleton here at some point
6 months ago
0
1
0
Passionate about Digital Forensics and Incident Response? Want to share your expertise with the security community while collaborating with talented analysts worldwide? We're looking for volunteer analysts to join the team! Ready to join the team? ➡️https://github.com/The-DFIR-Report/DFIR-Artifacts
6 months ago
0
5
3
reposted by
The DFIR Report
Want to join a team of amazing volunteer DFIR analysts? Ready to collaborate with us and leave your mark on the DFIR industry? Come join our team! We've updated our repo with a new report template and the graphics we commonly use. Apply today!👉
github.com/The-DFIR-Rep...
loading . . .
GitHub - The-DFIR-Report/DFIR-Artifacts: Repository for sharing examples of our artifacts data and for use in new analyst recruitment.
Repository for sharing examples of our artifacts data and for use in new analyst recruitment. - The-DFIR-Report/DFIR-Artifacts
https://github.com/The-DFIR-Report/DFIR-Artifacts
6 months ago
0
4
2
“For this case we observed TXT records being utilized for C2 communication rather than MX records. This can be identified by the "type: 16" in the Sysmon logs seen above. Below is a sample list that, while not exhaustive, provides a clear example of the traffic patterns:” 1/2
6 months ago
1
5
0
Want to join a team of amazing volunteer DFIR analysts? Ready to collaborate with us and leave your mark on the DFIR industry? Come join our team! We've updated our repo with a new report template and the graphics we commonly use. Apply today!👉
github.com/The-DFIR-Rep...
loading . . .
GitHub - The-DFIR-Report/DFIR-Artifacts: Repository for sharing examples of our artifacts data and for use in new analyst recruitment.
Repository for sharing examples of our artifacts data and for use in new analyst recruitment. - The-DFIR-Report/DFIR-Artifacts
https://github.com/The-DFIR-Report/DFIR-Artifacts
6 months ago
0
4
2
🏹Fresh C2 Infrastructure Identified🏹 Here are a few examples of C2 infrastructure we're currently tracking: 🔗 a-0002[.]a2-msedge[.]net 🔗 m365-notifications[.]com 🔗 oncloudaccess[.]com Want access to intel like this? 📞Let’s talk:
thedfirreport.com/contact/
loading . . .
Contact Us
PGP Key
https://thedfirreport.com/contact/
7 months ago
0
2
0
🌟New report out today!🌟 Fake Zoom Ends in BlackSuit Ransomware Analysis and reporting completed by @pigerlin, UC1 and @Miixxedup Audio: Available on Spotify, Apple, YouTube and more!
thedfirreport.com/2025/03/31/f...
loading . . .
Fake Zoom Ends in BlackSuit Ransomware
Key Takeaways The threat actor gained initial access by a fake Zoom installer that used d3f@ckloader and IDAT loader to drop SectopRAT. After nine days of dwell time, the SectopRAT malware dropped …
https://thedfirreport.com/2025/03/31/fake-zoom-ends-in-blacksuit-ransomware/
7 months ago
1
7
3
🟢 Now Accepting Analyst Applications! We're looking for passionate volunteer analysts! 📝 Position: Volunteer Analyst (with paid opportunities) 🔍 Process: Analyze our test case and submit your report ⏰ Deadline: Submit your report by April 21 Link ⬇️
7 months ago
1
2
1
🌟New report out Monday, March 31st by @pigerlin, UC1 and @Miixxedup! 📬 Want to be the first to know? Subscribe for updates:
thedfirreport.com/subscribe/
loading . . .
Subscribe
If you would like to receive an email when we publish a new report, please type your email address below and press subscribe. If you do not receive the confirmation email within a few minutes, plea…
https://thedfirreport.com/subscribe/
7 months ago
0
1
1
reposted by
The DFIR Report
🧙 Want to join the team? 🧙 We’re on the hunt for volunteer DFIR analysts—with potential for paid opportunities! You’ll get a set of artifacts and a limited time to show us what you’ve got. 🔎 Follow us on socials—details drop soon!
7 months ago
0
12
6
📣 We just launched a new page to highlight the top players from our DFIR Labs CTF events:
thedfirreport.com/services/dfi...
Congratulations to the winners so far for making it to the CTF Winners table! If you’ve placed in a past event, your name’s up there!
7 months ago
0
1
0
🚨 New Threat Actor TTPs Discovered! 🚨 During a recent investigation, our team identified a previously unfamiliar C2 framework in the wild—confirmed as Specter Insight C2.
#ThreatIntel
#DFIR
1/
7 months ago
1
0
0
🧙 Want to join the team? 🧙 We’re on the hunt for volunteer DFIR analysts—with potential for paid opportunities! You’ll get a set of artifacts and a limited time to show us what you’ve got. 🔎 Follow us on socials—details drop soon!
7 months ago
0
12
6
Load more
feeds!
log in