Advertisement Β· 728 Γ— 90

Posts by π™½π™΄πšƒπšπ™΄πš‚π™΄π™²

This "JWT_SESSION" cookie sure looks funky, with base64 encoded data between "metaPrefix" and "metaSuffix"!
πŸ”₯ 66.234.147.10:8080

3 weeks ago 3 1 0 0
✨ DFRWS EU 2026 Workshops

Led by Erik Hjelmvik (Netresec, Sweden), the session is designed for practitioners and researchers working with network and memory forensics in real-world investigations.

πŸ“ Workshop Dates 23–24 March 2026 
🧿 Details here:  https://buff.ly/oT8OtbE

✨ DFRWS EU 2026 Workshops Led by Erik Hjelmvik (Netresec, Sweden), the session is designed for practitioners and researchers working with network and memory forensics in real-world investigations. πŸ“ Workshop Dates 23–24 March 2026 🧿 Details here: https://buff.ly/oT8OtbE

✨ DFRWS EU 2026 Workshops

Led by Erik Hjelmvik (Netresec, Sweden), the session is designed for practitioners and researchers working with network and memory forensics in real-world investigations.

πŸ“ Workshop Dates 23–24 March 2026
🧿 Details here: buff.ly/oT8OtbE

#MemoryForensics #PCAP #TOR

1 month ago 1 1 0 0
✨DFRWS EU 2026 Workshops

πŸ“ Workshop Dates 23–24 March 2026
πŸ“ Hybrid β€’ LinkΓΆping, Sweden

Explore workshop details πŸ‘‰ https://buff.ly/Q45nyji
Register πŸ‘‰ https://buff.ly/lsQrqiZ

✨DFRWS EU 2026 Workshops πŸ“ Workshop Dates 23–24 March 2026 πŸ“ Hybrid β€’ LinkΓΆping, Sweden Explore workshop details πŸ‘‰ https://buff.ly/Q45nyji Register πŸ‘‰ https://buff.ly/lsQrqiZ

✨DFRWS EU 2026 Workshops

All DFRWS #Workshops and Social Events are inclusive in Registration. πŸ‘

πŸ“ Workshop Dates 23–24 March 2026
πŸ“ Hybrid β€’ LinkΓΆping, Sweden

Explore workshop details πŸ‘‰ buff.ly/Q45nyji
Register πŸ‘‰ buff.ly/lsQrqiZ

#NetworkTrafficAnalysis #MemoryForensics #DFIR #TorAnalysis

1 month ago 3 1 0 0
Post image

πŸ” A major phishing-as-a-service platform disrupted.

Tycoon2FA enabled large-scale account compromise by bypassing MFA protections.

Through Europol’s Cyber Intelligence Extension Programme, industry intelligence was turned into operational results.

Read more here: https://ow.ly/GECE50YoZIO

1 month ago 8 4 0 0

I'm interested in getting in touch with anyone who was involved in the WANK/OILZ worm outbreak at NASA/CERN/DoE in 1989.

I've talked to a few folks, but there are still blanks in this story - if you were part of that please ping me.

1 month ago 6 8 0 0
Preview
CISA mixup of IOC domains Googles Threat Intelligence Group (GTIG) and Mandiants recent Disrupting the GRIDTIDE Global Cyber Espionage Campaign report is great and it has lots of good Indicators of Compromise (IOC). Many of th...

netresec.com?b=26233f4

1 month ago 0 1 0 0
GRU unit 26165 domains:
accesscan[.]org  glize[.]com
You’ve verified them, right?
You’ve verified them, right?

GRU unit 26165 domains: accesscan[.]org glize[.]com You’ve verified them, right? You’ve verified them, right?

21 of the world's best intelligence and security agencies cannot be wrong... right?
netresec.com?b=26233f4

1 month ago 2 1 1 0
Preview
CISA mixup of IOC domains Google's Threat Intelligence Group (GTIG) and Mandiant's recent Disrupting the GRIDTIDE Global Cyber Espionage Campaign report is great and it has lots of good Indicators of Compromise (IOC). ...

Do CISA analysts type out IOC domains by hand?
netresec.com?b=26233f4

1 month ago 1 1 0 0
✨ DFRWS EU 2026 Workshops

Hands-on Analysis of Network Packets Carved from Memory & PCAP Analysis of Unencrypted Tor Traffic

Led by Erik Hjelmvik (Netresec, Sweden), the session is designed for practitioners and researchers working with network and memory forensics in real-world investigations.

πŸ“ Workshop Dates 23–24 March 2026 
Details here: πŸ‘‰ https://buff.ly/oT8OtbE

✨ DFRWS EU 2026 Workshops Hands-on Analysis of Network Packets Carved from Memory & PCAP Analysis of Unencrypted Tor Traffic Led by Erik Hjelmvik (Netresec, Sweden), the session is designed for practitioners and researchers working with network and memory forensics in real-world investigations. πŸ“ Workshop Dates 23–24 March 2026 Details here: πŸ‘‰ https://buff.ly/oT8OtbE

✨ DFRWS EU 2026 Workshops

Led by Erik Hjelmvik (Netresec, Sweden), the session is designed for practitioners and researchers working with network and memory forensics in real-world investigations.

πŸ“ Workshop Dates 23–24 March 2026
πŸ“ Details here: πŸ‘‰ buff.ly/oT8OtbE

2 months ago 1 1 0 0

Erik Hjelmvik will run a hands-on network forensic workshop at the upcoming Digital Forensics Research Conference in Sweden. Participants will get the chance to analyze:
πŸ”ͺ Packets carved from memory dumps
πŸ§… Unencrypted Tor traffic
dfrws.org/dfrws-eu-202...

2 months ago 2 1 0 0
Advertisement
Preview
njRAT runs MassLogger njRAT is a remote access trojan that has been around for more than 10 years and still remains one of the most popular RATs among criminal threat actors. This blog post demonstrates how NetworkMiner Pr...

Decoding #njRAT C2 traffic to extract screenshots, commands and transferred files
netresec.com?b=262adb9

2 months ago 3 2 0 0
Preview
Attributive Questions in High Profile Incidents On 30 January 2026, CERT.PL published findings concerning an electric sector attack on Poland in December 2025. This report, presumably the most complete on the incident covering multiple sources a…

Some initial thoughts on recent disclosures concerning the December 2025 incident targeting the Polish electric sector - with a focus on #CTI elements such as attribution implications and methodology:
pylos.co/2026/01/31/a...

2 months ago 7 3 1 1
NetworkMiner has been around for a long time, and it shows β€” in a good way.

It feels opinionated. It feels calm. It feels like a tool made by people who’ve already had a few bad days in incident response.

No hype. No buzzwords. Just packets telling you what happened.

NetworkMiner has been around for a long time, and it shows β€” in a good way. It feels opinionated. It feels calm. It feels like a tool made by people who’ve already had a few bad days in incident response. No hype. No buzzwords. Just packets telling you what happened.

Thank you for those kind words! πŸ’œ
www.linkedin.com/pulse/issue-...

2 months ago 2 2 0 0
Preview
Online Network Forensics Class I will teach a live online network forensics training on February 23-26. The full title of the class is Network Forensics for Incident Response, where we will analyze PCAP files containing network tra...

The early bird discount, for our live online network forensics class, expires by the end of this week. Sign up if you’d like to analyze PCAP files together with Erik Hjelmvik (creator of NetworkMiner and PolarProxy).
netresec.com?b=25A2e4f

2 months ago 0 1 0 0
Post image

DFRWS EU 2026 is seeking posters showcasing interesting digital forensics research for presentation in LinkΓΆping, Sweden, 24–27th March 2026. πŸ“₯ Submit via EasyChair (PDF) - Rolling notification until the program is full! #DFRWSEU2026 #DFRWS #DigitalForensics

2 months ago 0 1 0 0
Preview
Decoding malware C2 with CyberChef This video tutorial demonstrates how malware C2 traffic can be decoded with CyberChef. The PCAP files with the analyzed network traffic can be downloaded from malware-traffic-analysis.net. CyberChef r...

🎬 Video: Decoding malware C2 with #CyberChef
netresec.com?b=261f535

2 months ago 2 2 0 0

Big thank you to @thedfirreport.bsky.social for capturing this intrusion traffic! πŸŽ‰

4 months ago 1 0 0 0
Advertisement
Keylog extracted from BackConnect VNC network traffic by NetworkMiner

Keylog extracted from BackConnect VNC network traffic by NetworkMiner

Keylog of attacker's hands-on keyboard actions from BackConnect VNC session

4 months ago 0 1 1 0
Attacker fails to inspect ad_users.txt

Attacker fails to inspect ad_users.txt

Here's one of the screenshots from the BackConnect VNC sessions in the blog post

4 months ago 0 0 1 0
Preview
Latrodectus BackConnect I recently learned that the great folks from The DFIR Report have done a writeup covering the Latrodectus backdoor. Their report is titled From a Single Click: How Lunar Spider Enabled a Near Two-Mont...

Extracting VNC screenshots and keylog data from #Latrodectus πŸ•·οΈ BackConnect
netresec.com?b=25Cfd08

4 months ago 6 2 1 0
Preview
NetworkMiner 3.1 Released This NetworkMiner release brings improved extraction of artifacts like usernames, passwords and hostnames from network traffic. We have also made some updates to the user interface and continued our e...

NetworkMiner 3.1 Released!
πŸ”‘ More usernames, passwords and hostnames from #PCAP
πŸ’» Improved user interface
πŸ‘Ύ Better details from malware C2 traffic
netresec.com?b=25C4039

4 months ago 2 2 0 0
Post image

CN #APT targeting attendees of a diabetes conference in Singapore in December
attd.z23.web.core[.]windows[.]net/ATTD-ASIA-2025.zip (live link, careful!)
ATTD-ASIA-2025.lnk a12357ff6c0f7b021f32b0c9cd3d01c4
ATTD-ASIA-2025.zip a8082a80cef9ccee9d7a35f5366e3afb
gzv.msi 32e7dcbd26b6455974d5b2c52c3ca421 🐴

4 months ago 3 1 2 0

C2 runs on:
πŸ”₯ portabalbufe[.]com
πŸ”₯ 172.67.212.147:443
Other C2 indicators:
πŸ”₯ JA3 a0e9f5d64349fb13191bc781f81f42e1
πŸ”₯ JA4 t12d190800_d83cc789557e_7af1ed941c26
πŸ”₯ Cert hash 25aa00e75ca12bc66ff475ebe9c6bfbd466e91ed

4 months ago 3 0 0 0

That's great! Long lived IOCs like that are golden.

5 months ago 0 0 0 0

The boring answer is of course "it depends". But most incident responders would probably agree that a C2 IP address can be considered "old" when a couple of weeks have passed since it was last seen active.

5 months ago 0 0 1 0
π™½π™΄πšƒπšπ™΄πš‚π™΄π™² (@netresec@infosec.exchange) Here's a copy-paste friendly version of our ASCII Pyramid of Pain License: CC0 ``` ,/\ ,Β΄V_-\ IOC Pyramid ,Β΄\/-__-\ of Pain ,Β΄\\/-_--_-\ ,Β΄\\\V_--TTP-_...

Agreed, real-world IOC decay/score varies depending on TA choices as well as the actions we take as defenders.

Fantastic that you like our ASCII Pyramid of Pain 😊
Here's a CC0 licensed copy-paste friendly version:
infosec.exchange/@netresec/11...

5 months ago 0 0 0 0
Advertisement

I love the idea of calculating the decay rate of an IOC. It's not always strictly mathematical, because it also relies on threat actors' choices about how they use the IOCs, but as an estimate and for decision making, this seems promising.

Also, I really like @netresec.com's ASCII art Pyramid. πŸ˜€

5 months ago 6 1 2 0
Preview
Optimizing IOC Retention Time Are you importing indicators of compromise (IOC) in the form of domain names and IP addresses into your SIEM, NDR or IDS? If so, have you considered for how long you should keep looking for those IOCs...

Monitoring for too many old indicators not only costs money, it can even inhibit detection of real intrusions.
πŸ“† Include "last seen" date when publishing IOCs
❌ Prune old IOCs
πŸ“œ Prioritize long lived IOCs over short lived ones
netresec.com?b=25Be9dd

5 months ago 3 1 1 1
Post image

🚨 The #DFRWSEU 2026 paper submission deadline has been extended to 10th October 2025 πŸŽ‰

Submit your paper showcasing cutting-edge digital forensics research.

πŸ“€ Submit here: buff.ly/BN8Jlnb
ℹ️ Conference details: buff.ly/KOw9Xpr

#DFRWS #DigitalForensics #CFP

6 months ago 3 1 0 0