The DFIR Report's Avatar

The DFIR Report

@thedfirreport.bsky.social

Real Intrusions by Real Attackers, the Truth Behind the Intrusion. https://thedfirreport.com

1,141 Followers  |  0 Following  |  123 Posts  |  Joined: 14.08.2023  |  1.4013

Latest posts by thedfirreport.bsky.social on Bluesky

➡️ The above is from a recent Private Threat Brief: "Signed Malware, PowerShell Abuse, and Azure Exfiltration in Fake WinSCP Intrusion"
➡️➡️Interested in receiving reports like this one? Contact us for a demo or pricing - thedfirreport.com/contact/

20.10.2025 00:14 — 👍 1    🔁 0    💬 0    📌 0

"...It's unclear why they scanned these external IPs. An interesting observation is that they scanned public IP ranges which hosted the C2 addresses used by Supper:"

20.10.2025 00:14 — 👍 0    🔁 0    💬 1    📌 0

"Checking the registry and network traffic, we could identify ranges they scanned. They most likely ran several scans in Advanced IP scanner. We found evidence of scans for private IP ranges as well as multiple public IP ranges belonging to Microsoft and other entities..."

20.10.2025 00:14 — 👍 1    🔁 0    💬 1    📌 0

➡️ The above is from a recent Private Threat Brief: "Signed Malware, PowerShell Abuse, and Azure Exfiltration in Fake WinSCP Intrusion"
➡️➡️Interested in receiving reports like this one? Contact us for a demo or pricing - thedfirreport.com/contact/

16.10.2025 13:29 — 👍 0    🔁 0    💬 0    📌 0
Post image

We identified a malvertising campaign targeting users searching for legitimate software, leading to the download of a trojanized WinSCP installer that deployed Broomstick/OysterLoader.

All files involved in the initial access phase were signed with valid certificates.

16.10.2025 13:29 — 👍 2    🔁 1    💬 1    📌 0
Preview
DFIR Labs Portal Browse and purchase DFIR Labs to enhance your cybersecurity skills.

The full lab from the challenge is now live, with all quiz-style questions included.
➡️ Try it via one-time access -> dfirlabs.thedfirreport.com/store
or subscription - > dfirlabs.thedfirreport.com/subscription...

And we just dropped the full report too:
📄 thedfirreport.com/2025/09/29/f...

29.09.2025 23:37 — 👍 0    🔁 0    💬 0    📌 0
Post image Post image

DFIR Challenge Weekend Recap!

The challenge is complete! A massive thank you to everyone who participated in our latest DFIR Challenge!

Big shoutout to the top finishers who untangled the whole thing:

🥇 Jason Phang Vern Onn
🥈 Marko Yavorskyi
🥉 Bohdan Hrondzal

29.09.2025 23:37 — 👍 0    🔁 0    💬 1    📌 0

Report: thedfirreport.com/2025/09/29/f...

29.09.2025 14:49 — 👍 1    🔁 1    💬 0    📌 0
Post image

🌟New report out today!🌟

From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion

Analysis/reporting completed by @RussianPanda, Christos Fotopoulos, Salem Salem, reviewed by @svch0st.

Audio: Available on Spotify, Apple, YouTube and more!

Report:⬇️

29.09.2025 14:49 — 👍 0    🔁 0    💬 1    📌 0

Report: thedfirreport.com/2024/12/02/t...
Services: thedfirreport.com/services/
Contact Us for pricing or a demo thedfirreport.com/contact/

23.09.2025 23:19 — 👍 0    🔁 0    💬 0    📌 0
Post image

"Once the victim uncompressed the zip, they clicked the Windows Shortcut file John-_Shimkus.lnk which executed the infection flow.

Of note, the image 2.jpg that was alongside the payload in the .zip was not used by the malware. We assess that it was likely used to “pad” the..."

23.09.2025 23:19 — 👍 1    🔁 0    💬 1    📌 0

Report: thedfirreport.com/2025/09/08/b...
Services: thedfirreport.com/services/
Contact Us for pricing or a demo thedfirreport.com/contact/

22.09.2025 22:10 — 👍 0    🔁 0    💬 0    📌 0
Post image

"Two of the binaries observed in this attack were masquerading as products from well-known and reputable security vendors.

The first binary, GT_NET.exe is associated with Grixba, a custom data-gathering tool used by the Play ransomware group. Its metadata was crafted to..."

22.09.2025 22:10 — 👍 3    🔁 0    💬 1    📌 0

Report: thedfirreport.com/2025/03/31/f...
Services: thedfirreport.com/services/
Contact Us for pricing or a demo thedfirreport.com/contact/

21.09.2025 13:05 — 👍 1    🔁 1    💬 0    📌 0
Post image

"The Zoom installer was created using Inno Setup, a free installer for Windows programs, and served as the delivery mechanism for a multi-stage malware deployment and execution chain.

The trojanized installer was a downloader, more publicly known as “d3f@ckloader”, and is..."

21.09.2025 13:05 — 👍 0    🔁 0    💬 1    📌 0

Report: thedfirreport.com/2025/01/27/c...
Services: thedfirreport.com/services/
Contact Us for pricing or a demo thedfirreport.com/contact/

20.09.2025 20:54 — 👍 0    🔁 0    💬 0    📌 0
Post image

"On the eleventh day, the threat actor began a ransomware deployment. This final stage included the preparatory steps to deploy across the network. The process started with the execution of a batch script named SETUP.bat, which created a staging file share..."

20.09.2025 20:54 — 👍 3    🔁 0    💬 2    📌 0

Report: thedfirreport.com/2025/05/19/a...
Services: thedfirreport.com/services/
Contact Us for pricing or a demo thedfirreport.com/contact/

19.09.2025 23:58 — 👍 0    🔁 0    💬 0    📌 0
Post image

"On the second day of the intrusion, Confluence was exploited multiple times over a roughly twenty-minute period from the IP address 109.160.16[.]68. No link was found from this IP to the other activity detailed so far in the report leading us to assess this was likely a ..."

19.09.2025 23:58 — 👍 0    🔁 0    💬 1    📌 0

thedfirreport.com/2025/09/08/b...

08.09.2025 14:47 — 👍 1    🔁 0    💬 0    📌 0
Post image

🌟New report out today!🌟

Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs

Analysis and reporting completed by @r3nzsec, @EncapsulateJ, @rkonicekr, & Adam Rowe

Audio: Available on Spotify, Apple, YouTube and more!

Report:⬇️

08.09.2025 14:47 — 👍 2    🔁 0    💬 1    📌 0
DFIR Labs - Subscription Plans

Get access to it through:

- Your subscription: dfirlabs.thedfirreport.com/subscription...
- Via one-time purchase from our store here: dfirlabs.thedfirreport.com/store

#dfir #CyberSecurity

03.09.2025 20:10 — 👍 1    🔁 0    💬 0    📌 0
Post image

🚨 New Lab Just Released: Specter’s Domain Heist – Private Case #35218

This lab is based on a detailed intrusion from our private case repositories 👇

📥 Workstation Compromise ➡️ Persistent Access ➡️ Discovery➡️ Privilege Escalation ➡️ Lateral Movement ➡️ Data Exfil

Link 👇

03.09.2025 20:10 — 👍 1    🔁 0    💬 1    📌 1
Preview
From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira Overview Bumblebee malware has been an initial access tool used by threat actors since late 2021. In 2023 the malware was first reported as using SEO poisoning as a delivery mechanism. Recently in …

🚨 Search for software, end up getting ransomware!

SEO-driven #Bumblebee malware campaigns observed throughout July led to domain compromise, data theft & #Akira ransomware. Tools included #AdaptixC2 & #Netscan.

thedfirreport.com/2025/08/05/f...

05.08.2025 12:39 — 👍 3    🔁 1    💬 0    📌 0
DFIR Labs - Subscription Plans

🚨 New: DFIR Labs Pro Tier is here!

🎯 Smarter investigations with:
• 🧠 AI Timeline Builder (w/ IOCs + notes)
• ⏱️ More lab time + extension credits
• 📊 Analytics dashboard w/ tailored insights

🔗 Dive in: dfirlabs.thedfirreport.com/subscription...

23.07.2025 13:13 — 👍 3    🔁 1    💬 0    📌 1
Preview
KongTuke FileFix Leads to New Interlock RAT Variant Researchers from The DFIR Report, in partnership with Proofpoint, have identified a new and resilient variant of the Interlock ransomware group’s remote access trojan (RAT). This new malware,…

🚨 New Interlock RAT variant spotted!

Researchers from The DFIR Report, in partnership with Proofpoint, have identified a new and resilient variant of the Interlock ransomware group’s remote access trojan (RAT).

🔎 thedfirreport.com/2025/07/14/k...

#DFIR #KongTuke #InterlockRAT #FileFix

14.07.2025 11:36 — 👍 2    🔁 1    💬 0    📌 1
DFIR Labs - Digital Forensics Challenge - Enterprise Edition

📢DFIR Labs Enterprise Forensics Challenge📢

🔹 When: Aug 30, 2025 (14:00-18:00 UTC)
🔹 SIEM: Azure Log Analytics, Elastic, or Splunk
🔹 Teams: 2-3 analysts
🔹 Prizes: Top team wins! 🏆

Limited spots available.

Register Now: dfirlabs.thedfirreport.com/dfirchalleng...

25.06.2025 12:27 — 👍 2    🔁 1    💬 0    📌 0
Preview
Hide Your RDP: Password Spray Leads to RansomHub Deployment Key Takeaways Initial access was via a password spray attack against an exposed RDP server, targeting numerous accounts over a four-hour period. Mimikatz and Nirsoft were used to harvest credential…

🌟New report out today!🌟

Hide Your RDP: Password Spray Leads to RansomHub Deployment

Analysis and reporting completed by @tas_kmanager, @iiamaleks and UC2

🔊Audio: Available on Spotify, Apple, YouTube and more!

thedfirreport.com/2025/06/30/h...

30.06.2025 11:17 — 👍 3    🔁 2    💬 0    📌 0
Preview
The Hive Ransomware Fail - Public Case #18364 This case is based on the public report From ScreenConnect to Hive Ransomware in 61 hours. You will investigate a domain-wide compromise that progressed through multiple stages, beginning with the abu...

Buy Now: store.thedfirreport.com/products/the... (or use your subscription token 😉)

Oh, and the dashboard?

We gave it a full UI refresh. Cleaner, faster, easier to use. Hope you enjoy it!

2/2

27.06.2025 14:37 — 👍 0    🔁 0    💬 0    📌 0

A New DFIR Lab is out: The Hive Ransomware Fail 🐝

A domain is under siege, can you trace the threat actor's steps? Sharpen your triage and lateral movement skills in this hands-on investigation.

➡️Difficulty: Easy

1/2

27.06.2025 14:37 — 👍 4    🔁 1    💬 1    📌 0