DFIR Radar

1.7K posts

DFIR Radar banner
DFIR Radar

DFIR Radar

@DFIR_Radar

Keeping DFIR Intelligence on your Radar.

가입일 Mart 2025
1 팔로잉1.4K 팔로워
고정된 트윗
DFIR Radar
DFIR Radar@DFIR_Radar·
Hundreds of cybersecurity blogs, research reports, and advisories published every day. No one has time to read them all. And the one report that matters? It's buried somewhere in the noise. That's why DFIR Radar exists. We monitor the cybersecurity landscape around the clock. Every article is evaluated for DFIR relevance. Only what's genuinely useful makes it through. The rest never reaches your feed. This feed is the result of that process. Every article is sourced, evaluated, and published only if it meets the standard. If you find something we missed, our Discord community lets you contribute directly. Discord community: discord.gg/rHkqgs53bF Built by a practitioner who needed this to exist. Follow once. Stay informed forever. #DFIR_Radar
DFIR Radar tweet media
English
1
14
124
40.8K
DFIR Radar
DFIR Radar@DFIR_Radar·
JDownloader website compromised May 6-7 serving Python RAT via malicious Windows/Linux installers. Attackers exploited CMS vulnerability to redirect download links. #DFIR_Radar
DFIR Radar tweet media
English
1
0
1
63
DFIR Radar
DFIR Radar@DFIR_Radar·
New attack bypasses all ransomware detection: GhostLock achieves full file unavailability across enterprise NAS using Windows API calls with zero encryption, writes, or forensic artifacts. Breakthrough findings: • Uses CreateFileW with dwShareMode=0x00000000 to hold exclusive handles on hundreds of thousands of files simultaneously • 32-thread parallel discovery maps 500K files in 6 minutes, locks 498K+ files in under 3 minutes with 99.6% success rate • Bypasses canary files, write-rate detection, behavioral AI, EDR, NDR - appears identical to document indexing • Victims get STATUS_SHARING_VIOLATION (0xC0000043) errors, complete application failure across ERP/document systems • Recovery requires storage admin to terminate SMB sessions - not covered in most IR runbooks Key technical details: • Leverages legitimate Win32 API behavior documented since Windows NT 3.1 • SMB2 CREATE requests use ShareAccess=0x00000000 per MS-SMB2 specification • No writes, renames, or entropy changes - zero disk forensic artifacts • Python PoC available on GitHub with exponential backoff for transient locks • Session persistence survives credential revocation for 15-60 minutes Primary detection opportunity: Monitor NAS session telemetry for >500 simultaneous exclusive handles per session. This metric exists in storage management APIs but isn't ingested into SIEMs. #DFIR_Radar
DFIR Radar tweet media
English
1
0
3
385
DFIR Radar
DFIR Radar@DFIR_Radar·
New guide showcases Zircolite, a SIGMA-based detection engine that transforms dense Windows Event Logs and Sysmon data into visual security findings. #DFIR_Radar
DFIR Radar tweet media
English
1
0
1
109
DFIR Radar
DFIR Radar@DFIR_Radar·
Fake OpenAI repository on Hugging Face reached trending with 244K downloads, delivering Rust-based infostealer targeting browser data, crypto wallets, and credentials via malicious loader.py script. C2: recargapopular[.]com. #DFIR_Radar
DFIR Radar tweet media
English
2
0
3
246
DFIR Radar
DFIR Radar@DFIR_Radar·
QLNX Linux RAT deploys fileless, memory-only execution with eBPF hiding, PAM backdoors, and P2P mesh networking to target DevOps environments. #DFIR_Radar
DFIR Radar tweet media
English
1
0
2
136
DFIR Radar
DFIR Radar@DFIR_Radar·
Which of this week's threats concerns you most heading into next week? The persistent firmware implants, mobile-focused campaigns, or state-sponsored ransomware operations? #DFIR_Radar #DFIR
English
0
0
1
21
DFIR Radar
DFIR Radar@DFIR_Radar·
📌 Operation HumanitarianBait: An Infostealer Campaign in Disguise
DFIR Radar@DFIR_Radar

Russian 🇷🇺-language humanitarian aid lures deliver sophisticated Python infostealer targeting aid workers. Multi-stage campaign uses GitHub infrastructure and PyArmor obfuscation to establish persistent surveillance platform with credential theft, remote access, and continuous monitoring capabilities. Technical Details: • Initial vector: LNK file (8a100cbdf79231e70cee2364ebd9a4433fda6b4de4929d705f26f7b68d6aeb79) in RAR archive with anti-sandbox evasion techniques • Payload hosted on GitHub Releases (hxxps://github[.]com/leravalera2/dtfls/releases) to abuse trusted infrastructure • Creates self-contained Python environment in %APPDATA%\WindowsHelper with PyArmor v9.2 Pro obfuscation • Full surveillance stack: browser credential theft (T1555.003), keylogging (T1056.001), clipboard monitoring (T1115), screenshots (T1113) • Silent RustDesk/AnyDesk deployment for persistent remote access (T1219) • Persistence via scheduled task "WindowsHelper" running every 5 minutes (T1053.005) C2 Infrastructure: • Primary server: 159[.]198[.]41[.]140 (Namecheap VPS, confirmed active May 2026) • Custom Flask dashboard for threat actor access to stolen data • Exfiltration via HTTP uploads with spoofed Chrome user-agent Monitor for unexpected Python environments in %APPDATA%, scheduled tasks with short intervals, and silent remote desktop tool installations by non-admin processes. #DFIR_Radar

English
1
0
1
26
DFIR Radar
DFIR Radar@DFIR_Radar·
DFIR Weekly Recap | This week brought fresh Linux kernel exploits, persistent firmware threats, and a surge in mobile-targeted malware campaigns. • Copy Fail and DirtyFrag expose critical Linux page cache vulnerabilities exploited in the wild • FIRESTARTER firmware implant survives patches and reboots, challenging traditional IR approaches • UAT-8302 deploys extensive malware arsenal across multiple attack vectors • CloudZ RAT targets OTP messages through specialized Pheno plugin capabilities • TCLBANKER spreads Brazilian banking trojan via WhatsApp and Outlook channels • OpenClaw skill distributes Remcos RAT and GhostLoader to unsuspecting users • ClickFix leverages fake macOS utilities to deliver sophisticated infostealers • State-sponsored actors hide behind Chaos ransomware operations • WAInsight provides new open-source forensics for WhatsApp Android analysis • HumanitarianBait masks infostealer campaign as legitimate humanitarian effort Top stories in the thread below. #DFIR_Radar
DFIR Radar tweet media
English
1
0
1
161