The DFIR Report

1.7K posts

The DFIR Report banner
The DFIR Report

The DFIR Report

@TheDFIRReport

Real Intrusions by Real Attackers, the Truth Behind the Intrusion.

thedfirreport.com/contact Katılım Nisan 2020
0 Takip Edilen65.4K Takipçiler
The DFIR Report
The DFIR Report@TheDFIRReport·
Defender Tip: Monitor for vol.exe or python.exe interacting with memory dump files in user temp folders. If you see Hashdump in your logs and it isn't your IR team... you have a live intrusion. Want more info? Get in touch!
English
0
1
17
2K
The DFIR Report
The DFIR Report@TheDFIRReport·
The Flow: A fake "Verify You Are Human" prompt leads to Node.js C2 (interlock RAT), followed by hands-on-keyboard activity where they use vol.exe from \AppData\Local\Temp\ to harvest credentials.
English
1
1
12
2.2K
The DFIR Report
The DFIR Report@TheDFIRReport·
Threat Actors are "Bringing Their Own Forensics" In a recent ClickFix campaign, we saw threat actors likely related to Interlock Ransomware, running Volatility (vol.py) directly on victim machines. Commonly a tool for defenders, the TAs are using it to:
The DFIR Report tweet media
English
4
60
297
19.5K
The DFIR Report
The DFIR Report@TheDFIRReport·
"On the Exchange email server, the threat actor used a legitimate Windows executable, SystemSettingsAdminFlows.exe, which allows users to customize or configure the system settings to user’s preference. This LOLBIN was used to disable Windows... " Report: thedfirreport.com/2026/02/23/apa…
The DFIR Report tweet media
English
1
31
156
14.6K
The DFIR Report retweetledi
The DFIR Report
The DFIR Report@TheDFIRReport·
🧪 DFIR Labs | LockBit Ransomware Case #27244 Investigate a real intrusion where a compromised Confluence server led to rapid domain-wide access. Step through the investigation and see how LockBit was deployed end-to-end. 👉 dfirlabs.thedfirreport.com/auth/login
The DFIR Report tweet media
English
2
26
146
14.6K
The DFIR Report
The DFIR Report@TheDFIRReport·
➡️ The above is from a Private Threat Brief: "Fake WinSCP Software Serves Supper and Oyster " ➡️➡️Interested in receiving more details about this report? Contact us for a demo or pricing - thedfirreport.com/contact/
English
0
1
3
1.8K
The DFIR Report
The DFIR Report@TheDFIRReport·
"In the logs we first observed a new service being installed on the backup server. Following that we observed the service execute and spawn a process tree that included a command to use COMSVCS to output a credential dump to a file in the temp directory:"
The DFIR Report tweet media
English
2
22
128
9K
The DFIR Report
The DFIR Report@TheDFIRReport·
Low noise. High signal. If you get an alert from our feed in your environment, ping us. We’ll help triage it. That’s how much we trust the signal. 🔎 Actionable 🎯 High-confidence ⚡ Built for defenders thedfirreport.com/products/threa…
The DFIR Report tweet media
English
0
4
24
3.4K
The DFIR Report
The DFIR Report@TheDFIRReport·
"After the creation of the rdp.bat file, several commands were executed via a CMD process to modify the host configuration, specifically to permit RDP through the firewall and set the RDP port number to 3389..." Link to report ⬇️
The DFIR Report tweet media
English
1
15
72
5.9K
The DFIR Report
The DFIR Report@TheDFIRReport·
➡️ The above is from a Private Threat Brief: "Fake RVTools Installer Leads to PipeMagic, CLFS Exploit, and Ransomexx" ➡️➡️Interested in receiving more details about this report or future private reports? Contact us for a demo or pricing - thedfirreport.com/contact/
English
0
3
14
2.7K
The DFIR Report
The DFIR Report@TheDFIRReport·
"Around 50 minutes after the connection to this second domain controller the ransomware propagation began. Deployment of ransomware consisted of creating remote services on domain joined endpoints, and included distributing the files via SMB."
The DFIR Report tweet media
English
6
69
316
29K
The DFIR Report retweetledi
Renzon
Renzon@r3nzsec·
DFIR analysts who use macOS as their daily driver deserve free and native forensic tooling. So I built one. 🍎 Introducing 𝗜𝗥𝗙𝗹𝗼𝘄 𝗧𝗶𝗺𝗲𝗹𝗶𝗻𝗲 — a timeline analysis app built from the ground up for Mac-based DFIR folks, forensic investigators, or SOC analysts. Built in appreciation of, and inspired by, Eric Zimmerman’s Timeline Explorer. Every feature in this tool was shaped by real IR casework. Handling massive timelines, parsing artifacts here and there, and pivoting across logs during active investigations. I built IRFlow Timeline to be the native macOS timeline analyzer that actually keeps up with a live case. Every button and view is intentional; if it’s in the app, it’s because I needed it mid-case and realized the standard tools fell short. No dependencies. Zero setup. Just drag, drop, and analyze. #dfir #incidentresponse #timeline #macos #threathunitng #digitalforensics
English
20
117
500
36.2K
The DFIR Report
The DFIR Report@TheDFIRReport·
"SoftPerfect NetScan was used extensively during the intrusion… evidence from Security Event ID 4688 logs showed mstsc.exe /v:<IP address> being launched by netscan.exe, confirming the use of NetScan’s Remote Desktop functionality." Full report 👇 thedfirreport.com/2025/11/17/cat…
The DFIR Report tweet media
English
2
7
35
4.2K
The DFIR Report retweetledi
J⩜⃝mie Williams
J⩜⃝mie Williams@jamieantisocial·
a lot of post compromise hands on keyboard activity will look like your admins, but not all of it....
J⩜⃝mie Williams tweet media
The DFIR Report@TheDFIRReport

🌟New report out today!🌟 Apache ActiveMQ Exploit Leads to LockBit Ransomware Analysis and reporting completed by @malforsec, @lapadrino, and @PeteO. 🔊Audio: Available on Spotify, Apple, YouTube and more! thedfirreport.com/2026/02/23/apa… #DFIR #DigitalForensics #BlueTeam

English
2
10
41
7.8K