Diogo Fernandes ๐Ÿค™๐Ÿผ

Diogo Fernandes ๐Ÿค™๐Ÿผ

@diogowski.bsky.social

๐Ÿ‡ต๐Ÿ‡น ๐Ÿ‡จ๐Ÿ‡ญ #DFIR, #malware, #detectionengineering and #python! + ๐Ÿšต๐Ÿผ๐Ÿคฟ๐Ÿ‚ https://github.com/diogo-fernan

152 Followers 432 Following 33 Posts Joined Nov 2024
8 months ago
Post image

There's a new ClickFix variation called FileFix

This one works by tricking users into copying a file path in Windows Explorer.

Attackers modify the clipboard, so you're actually pasting and running PowerShell ahead of the file path

mrd0x.com/filefix-clic...

30 10 2 1
9 months ago
Preview
Graphite Caught: First Forensic Confirmation of Paragonโ€™s iOS Mercenary Spyware Finds Journalists Targeted - The Citizen Lab We conducted a forensic analysis of devices belonging to two journalists who were notified by Apple that they were targeted with advanced spyware.

NEW @citizenlab.ca report confirms the targeting of two more journalist with #Paragon spyware in the context of ๐Ÿ‡ฎ๐Ÿ‡น

Details here: citizenlab.ca/2025/06/firs...

@billmarczak.org @jsrailton.bsky.social

61 43 1 4
9 months ago

The #FBI and #DCIS disrupted #Danabot. #ESET was one of several companies that cooperated in this effort. www.welivesecurity.com/en/eset-rese... 1/6

10 8 1 0
11 months ago
First page of the paper

Wrote a paper, with Daniel Nakov, on comparing the #quality & the speed of #malware analysis assisted by #r2ai, or without.

Spoiler 1: quality is =, speed is ++.
Spoiler 2: do not expect to get good results in a single question.

arxiv.org/pdf/2504.07574

cc: @radareorg.bsky.social #arxiv #radare2

7 5 1 0
11 months ago
Preview
Malicious VSCode extensions infect Windows with cryptominers Nine VSCode extensions on Microsoft's Visual Studio Code Marketplace pose as legitimate development tools while infecting users with the XMRig cryptominer for Monero.

Malicious VSCode extensions infect Windows with cryptominers #cybersecurity #hacking #news #infosec #security #technology #privacy www.bleepingcomputer...

1 1 0 0
1 year ago
Post image

#ESETresearch has discovered a zero day exploit abusing #CVE-2025-24983 vulnerability in Windows Kernel to elevate privileges (#LPE). First seen in the wild in March 2023, the exploit was deployed through #PipeMagic backdoor on the compromised machines. 1/4

18 12 1 0
1 year ago
Preview
Hindsight v2025.03 Released! Hindsight v2025.03 focuses on Extensions - parsing more activity and state records, highlighting Extension permissions, and making it easier to examine Manifests.

There's a new Hindsight release!

Hindsight v2025.03 focuses on Extensions - parsing more activity and state records, highlighting Extension permissions, and making it easier to examine Manifests.

๐ŸŒ Blog: dfir.blog/hindsight-pa...
๐Ÿ› ๏ธ Tool download: hindsig.ht/release

#DFIR #Chrome #Extensions

8 4 0 0
1 year ago

Chrome 134 is out and there's a new system that automatically blocks unpacked Chrome extensions from running if Developer Mode is not enabled first.

12 5 1 0
1 year ago
Video thumbnail

No more platform-hopping! ๐Ÿ•ต๏ธโ€โ™‚๏ธ Hunt across all abuse.ch platforms with just 1๏ธโƒฃ simple query. ๐Ÿ”Ž Search for any IPv4, domain, URL, or file hash, and instantly see if itโ€™s been identified on any abuse.ch platform!

Start your hunt now ๐Ÿ‘‰ hunting.abuse.ch

21 12 0 0
1 year ago
Post image

Comparing Decai decompilation using @anthropic.com 's Claude 3.5 vs 3.7 with a simple strcoll wrapper function #r2ai #radare2

6 5 1 0
1 year ago
Post image

You receive a laptop (powered off) in a high-stakes case. You are told the owner is extremely technical but given no useful technical details. The laptop is modern, with chassis intrusion features, and you must assume Secure Boot & BitLocker are in use. How do you proceed? #DFIR

2 1 1 1
1 year ago
Preview
An inside look at NSA (Equation Group) TTPs from Chinaโ€™s lense

If you live in the West, it's not often you read about CIA/NSA cyber operations against China. But here's one: "How the NSA Allegedly Hacked Chinaโ€™s Northwestern Polytechnical," a leading Chinese university specializing in aerospace & defence. www.inversecos.com/2025/02/an-i...

22 14 2 5
1 year ago
Screenshot showing the execution of the proof-of-concept named PowerChell in comparison to a typical PowerShell prompt. In particular, it shows that PowerChell is able to bypass the Constrained Language Mode (CLM).

In this blog post, I explain how I was able to create a PowerShell console in C/C++, and disable all its security features (AMSI, logging, transcription, execution policy, CLM) in doing so. ๐Ÿ’ช

๐Ÿ‘‰ blog.scrt.ch/2025/02/18/r...

43 19 2 2
1 year ago
Preview
Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication Starting in mid-January 2025, Volexity identified several social-engineering and spear-phishing campaigns by Russian threat actors aimed at compromising Microsoft 365 (M365) accounts. These attack cam...

@volexity.com recently identified multiple Russian threat actors targeting users via #socialengineering + #spearphishing campaigns with Microsoft 365 Device Code authentication (a well-known technique) with alarming success: www.volexity.com/blog/2025/02...

#dfir #threatintel #m365security

35 20 2 7
1 year ago
Preview
Release v0.13.0 ยท VirusTotal/yara-x Implemented basic linting via the check command. Refactor the format of JSON output (#281). Parse Mach-O certificates (#276). Allow using previously defined variables in with statements (#287). BUG...

YARA-X 0.13.0 is out: github.com/VirusTotal/y...

As always, Victor and the contributors are cranking out quality improvements!

In particular, check out the docs on how to use the formatter and linter and open issues (or tell me somehow) if you hit bugs or have things you want to see.

8 4 1 0
1 year ago

The threat landscape in H2 2024 was quite tumultuous when it comes to some of the most prominent infostealer threats. One of them, the notorious #RedLine Stealer, finally met its demise after being taken down by law enforcement in #OperationMagnus. #ESETresearch ๐Ÿงต 1/5

7 4 1 1
1 year ago
Preview
by savage | 2025-01-22

A "code family" is a basic concept in @vertexproject.bsky.social's approach to tool analysis. Check out the next installment in Mary Beth Lee's malware manifesto as she defines "code family", how it differs from "malware family", and how this aids your #CTI analysis!

vertex.link/blogs/catego...

11 5 0 0
1 year ago
Post image Post image Post image

#100daysofyara todays rule is detecting patched clr.dll in memory AmsiScanBuffer bypass. My @velocidex Windows.System.VAD artifact can be used to target clr.dll mapped sections for an easy detection.

Rule: github.com/mgreen27/100...
VQL: github.com/mgreen27/100...

6 5 0 0
1 year ago
YouTube
Venture Windows Log Viewer: Early Alpha Overview Introducing Venture, a cross-platform viewer for Windows Event Logs! This is an overview of the early alpha at v0.2.0. Grab Venture at https://github.com/mttaggart/venture/releases/latest!

Here's a video overview of Venture, the cross-platform Windows Event Viewer. Version 0.2.0 now has the ability to join multiple .evtx files into a single view!

www.youtube.com/watc...

Grab Venture here: github.com/mttaggart...

32 13 1 3
1 year ago
Preview
Intune Attack Pathsโ€Šโ€”โ€ŠPart 1 Intune is an attractive system for adversaries to targetโ€ฆ

Check out this new blog post from @andyrobbins.bsky.social discussing the fundamental components & mechanics that enable the emergence of critical Attack Paths in Microsoft's increasingly popular Intune product. ghst.ly/3Cd5cwH

6 4 0 0
1 year ago
Post image Post image

live #dprk fake interview site up and running if you're looking to experiment ... digitptalent[.]com ... both windows and mac malware

2 1 0 0
1 year ago

Even on Friday evenings? ๐Ÿ˜ˆ

0 0 0 0
1 year ago

I know the feeling! ๐Ÿคฃ

1 0 0 0
1 year ago
Preview
GitHub - Santandersecurityresearch/DrHeader: drHEADer helps with the audit of security headers received in response to a single request or a list of requests. drHEADer helps with the audit of security headers received in response to a single request or a list of requests. - Santandersecurityresearch/DrHeader

You might find this helpful
github.com/Santandersec...

6 3 1 0
1 year ago

*non-cyber people ๐Ÿ˜„

0 0 0 0
1 year ago
Preview
Phishing platform Rockstar 2FA trips, and โ€œFlowerStormโ€ picks up the pieces A sudden disruption of a major phishing-as-a-service provider leads to the rise of anotherโ€ฆthat looks very familiar

Just put out this research on MiTM PaaS kits labeled Rockstar and Flowerstorm over the past few months. While my name is on this I partnered with two researchers, Josh Rawles and Jordon Olness who did a bulk of the work alongside @thepacketrat.net, and Colin Cowie who are all individually brilliant!

4 2 1 0
1 year ago
Preview
GitHub - yo-yo-yo-jbo/dictiopwn: Unix-based dictionary attack utility Unix-based dictionary attack utility. Contribute to yo-yo-yo-jbo/dictiopwn development by creating an account on GitHub.

Did you know that you can conduct an easy local dictionary attack on Linux without lockout times? Wrote a small tool for that, feel free to check it out:
github.com/yo-yo-yo-jbo...

2 1 0 0
1 year ago
Preview
Hidden in Plain Sight: TA397โ€™s New Attack Chain Delivers Espionage RATs | Proofpoint US Key findingsย  Proofpoint observed advanced persistent threat (APT) TA397 targeting a Turkish defense sector organization with a lure about public infrastructure projects in Madagascar.ย ย  The attack...

Dropping some new research on TA397/Bitter ๐Ÿšจ

Hidden in Plain Sight | TA397โ€™s New Attack Chain Delivers Espionage RATs

Report:
www.proofpoint.com/us/blog/thre...

16 13 2 1
1 year ago
Post image

๐Ÿง Itโ€™s finally here! ๐Ÿ”
The Linux EDR Telemetry Project results are live! After months of testing and collaboration, weโ€™re excited to share how well EDR solutions handle Linux visibility.

Read the full blog here: ๐Ÿ“๐Ÿ‘‡
kostas-ts.medium.com...
1/2

12 10 1 0