The DFIR Report

Real Intrusions by Real Attackers, the Truth Behind the Intrusion.

Detections: github.com/The-DFIR-Report | Services: thedfirreport.com/services |

2026-01-07

🧪 DFIR Labs | LockBit Ransomware Case #27244

Investigate a real intrusion where a compromised Confluence server led to rapid domain-wide access.

Step through the investigation and see how LockBit was deployed end-to-end.
👉 dfirlabs.thedfirreport.com/aut

The DFIR Report boosted:
2025-12-31

DFIR Labs is closing out the year with 25% off all cases and subscriptions.

✔ Buy now, redeem anytime over the next 3 months
⏰ Offer ends January 1
💳 Discount applied automatically at checkout

dfirlabs.thedfirreport.com/

2025-12-26

DFIR Labs is closing out the year with 25% off all cases and subscriptions.

✔ Buy now, redeem anytime over the next 3 months
⏰ Offer ends January 1
💳 Discount applied automatically at checkout

dfirlabs.thedfirreport.com/

The DFIR Report boosted:
𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲netresec@infosec.exchange
2025-12-23

Extracting VNC screenshots and keylog data from #Latrodectus 🕷️ BackConnect
netresec.com/?b=25Cfd08

2025-12-22

"The unusual command copied to the user's clipboard abused the SSH ProxyCommand option to quietly invoke the Windows Installer (msiexec) and download a payload, marking the start of the intrusion."

➡️ The above is from a Private Threat Brief: "SSH by ClickFix: Node.js RAT Leads to SystemBC and S3 Exfiltration "
➡️➡️Interested in receiving reports like this one? Contact us for a demo or pricing - lnkd.in/gk-yfpJm

2025-12-22

🎁 DFIR Labs Giveaway 🎁

We’re giving away 5 FREE DFIR Labs cases!

How to enter:

➡️Post your favorite DFIR Report in the replies
➡️Tell us why it's your favorite

That’s it! 🙌 We’ll select 5 winners before Christmas!

DFIR Labs - dfirlabs.thedfirreport.com/aut
Reports - thedfirreport.com/

2025-12-17

"Approximately 20 minutes after the initial successful whoami command execution from 45.227.254[.]124, the intrusion commenced from a new IP address, 91.191.209[.]46, utilizing a slightly modified version of the exploit. It’s plausible that the exploitation script used in the second instance, which downloaded and executed the Metasploit payload...."

Report: thedfirreport.com/2025/05/19/a #DFIR #CyberSecurity #InfoSec #ThreatHunting #IncidentResponse #DigitalForensics #BlueTeam

2025-12-10

We identified a malvertising campaign targeting users searching for legitimate software, leading to the download of a trojanized WinSCP installer that deployed Broomstick/OysterLoader. The infection chain established persistence through scheduled tasks and ultimately dropped a Supper (SocksShell/ZAPCAT) variant, enabling remote access and SOCKS5 proxying.

All files involved in the initial access phase were signed with valid certificates.

#DFIR #ThreatIntel #IncidentResponse #CyberSecurity

2025-12-10

➡️ The above is from a Threat Brief: "Signed Malware, PowerShell Abuse, and Azure Exfiltration in Fake WinSCP Intrusion"
➡️➡️Interested in receiving reports like this one? Contact us for a demo or pricing - thedfirreport.com/contact/

#DFIR #ThreatIntel #IncidentResponse #CyberSecurity #InfoSec #ThreatHunting #IncidentResponse #DigitalForensics #BlueTeam

2025-12-01

"On day six of the intrusion, the threat actor started preparing for the automated deployment of the ransomware payload throughout the network.
After the initial execution of the ransomware binary on a system, the spawned process began establishing connections with other internal systems..."

Report: thedfirreport.com/2025/06/30/h
Services: thedfirreport.com/services/
Contact Us for pricing or a demo thedfirreport.com/contact/

2025-11-24

🎉 BLACK FRIDAY DEAL IS LIVE! 🎉

Now until December 1st, all swag in our store is 50% OFF — shirts, hoodies, and stickers, while supplies last!

🛒 Prices are already reflected in the cart:
• Stickers: $1
• T-Shirts: $10
• Hoodies: $16

🎁 Bonus: Every order comes with 2 FREE DFIR Report stickers!

Don’t miss it — once it’s gone, it’s gone.

store.thedfirreport.com/collec

2025-11-20

➡️ The above is from a Private Threat Brief: "Signed Malware, PowerShell Abuse, and Azure Exfiltration in Fake WinSCP Intrusion"
➡️➡️Interested in receiving reports like this one? Contact us for a demo or pricing - thedfirreport.com/contact/

2025-11-20

"Checking the registry and network traffic, we could identify ranges they scanned. They most likely ran several scans in Advanced IP scanner. We found evidence of scans for private IP ranges as well as multiple public IP ranges belonging to Microsoft and other entities. It's unclear why they scanned these external IPs. An interesting observation is that they scanned public IP ranges which hosted the C2 addresses used by Supper:"

#DFIR #ThreatIntel #IncidentResponse #CyberSecurity #InfoSec

2025-11-17

🐈 Cat’s Got Your Files: Lynx Ransomware

🎉New report out by @Friffnz, Daniel Casenove & @MittenSec!🎉

Attackers used stolen creds to access RDP, quickly pivoted to a DC with a second compromised admin, created impersonation accounts, mapped the environment, and more!

thedfirreport.com/2025/11/17/c

#DFIR #ThreatIntel #IncidentResponse #CyberSecurity #InfoSec #ThreatHunting #IncidentResponse #DigitalForensics #BlueTeam

2025-11-16

🎉New report out Monday 11/17 by @Friffnz, Daniel Casenove & @MittenSec!

"Artifacts of this SMB enumeration were left behind in the smb.db database stored by NetExec in C:\Users\%UserProfile%\nxc\workspaces\smb.db. This database confirms that a number of domains and hosts were successfully enumerated using the domain admin credentials during scanning."

Want a heads-up when we drop a new report? Sign up here: thedfirreport.com/subscribe/

2025-11-15

🎉New report out Monday 11/17 by @Friffnz, Daniel Casenove & @MittenSec!

"In this case, Netscan was run with domain administrator privileges, so all discovered shares were writable. As a result, NetScan was able to create and delete the delete[.]me file on each discovered share.

These actions generated Windows Security Event ID 5145 object access entries referencing the delete[.]me file."

Want a heads-up when we drop a new report? Sign up here: thedfirreport.com/subscribe/

2025-11-14

🎉New report out Monday 11/17 by @Friffnz, Daniel Casenove & @MittenSec!

"On the domain controller, they used the "Active Directory Users and Computers" snap-in (dsa.msc) to create three users for persistence. All of the newly created accounts have usernames that mimic legitimate accounts already present in the environment."

Want a heads-up when we drop a new report? Sign up here: thedfirreport.com/subscribe/

2025-11-13

🎉New report out Monday 11/17 by @Friffnz, Daniel Casenove & @MittenSec!

"The first instance of unauthorized access by the threat actor was a successful RDP logon to the beachhead host, a publicly exposed RDP server. The logon was performed using valid credentials, and there was no indication of brute force or password spraying occurring, indicating these credentials were obtained prior to the intrusion...

1/2

2025-11-13

...The threat actor was also observed using credentials for a second account with domain administrator privileges to pivot from the beachhead host without performing any credential access activities, indicating these credentials were also obtained prior to initial access."

Want a heads-up when we drop a new report? Sign up here: thedfirreport.com/subscribe/

2/2

2025-10-19

➡️ The above is from a recent Private Threat Brief: "Signed Malware, PowerShell Abuse, and Azure Exfiltration in Fake WinSCP Intrusion"
➡️➡️Interested in receiving reports like this one? Contact us for a demo or pricing - thedfirreport.com/contact/

#DFIR #ThreatIntel #IncidentResponse #CyberSecurity #InfoSec #ThreatHunting #IncidentResponse #DigitalForensics #BlueTeam

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst