Pierre

71 posts

Pierre banner
Pierre

Pierre

@pigerlin

Analyst @TheDFIRReport | Passionate about all things DFIR 🇳🇱

Присоединился Nisan 2011
137 Подписки753 Подписчики
Pierre ретвитнул
The DFIR Report
The DFIR Report@TheDFIRReport·
🌟New report out today!🌟 From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion Analysis/reporting completed by @RussianPanda, Christos Fotopoulos, Salem Salem, reviewed by @svch0st. Audio: Available on Spotify, Apple, YouTube and more! Report:⬇️
The DFIR Report tweet media
English
5
53
153
49.6K
Pierre ретвитнул
The DFIR Report
The DFIR Report@TheDFIRReport·
New report out Monday 12/4 by @yatinwad! ➡️This intrusion starts with a MSSQL server being brute forced and ends in BlueSky ransomware. ➡️The threat actor went from initial access to network wide ransomware in under 1 hour.
The DFIR Report tweet media
English
2
15
50
9K
Pierre ретвитнул
The DFIR Report
The DFIR Report@TheDFIRReport·
HTML Smuggling Leads to Domain Wide Ransomware ➡️Initial Access: Thread-Hijacked Email > HTML Attachment ➡️Credentials: LSASS Access, SessionGopher ➡️Lateral Movement: RDP, PsExec ➡️C2: IcedID, Cobalt Strike ➡️Impact: Nokoyawa Ransomware thedfirreport.com/2023/08/28/htm… 1/X
English
5
165
372
96.9K
Pierre ретвитнул
The DFIR Report
The DFIR Report@TheDFIRReport·
A Truly Graceful Wipe Out ➡️Initial Access: Email > TDS > Truebot download ➡️Credentials: LSASS & Registry Dump ➡️Persistence: Scheduled Task ➡️C2: Truebot, FlawedGrace, Cobalt Strike ➡️Exfiltration: FlawedGrace ➡️Impact: MBR Killer thedfirreport.com/2023/06/12/a-t… 1/X
English
1
159
348
86.1K
Pierre ретвитнул
The DFIR Report
The DFIR Report@TheDFIRReport·
Here's an interesting batch script you'll see in an upcoming report: ➡️Do you know what it's doing? ➡️Would you struggle to do analysis on a system if it ran? Why or Why not? ➡️Are there any rules available to detect this activity? Post your answers below
The DFIR Report tweet media
English
25
40
148
61K
Pierre ретвитнул
The DFIR Report
The DFIR Report@TheDFIRReport·
Unwrapping Ursnifs Gifts ➡️Initial Access: Ursnif ISO/LNK/DLL ➡️Discovery: Get-ADComputer, nltest, net view, etc. ➡️Credentials: LSASS access ➡️Lateral: Impacket ➡️Persistence: Registry Run Key ➡️C2: Ursnif, Cobalt Strike thedfirreport.com/2023/01/09/unw… 1/X
English
1
94
227
50.7K
Pierre ретвитнул
The DFIR Report
The DFIR Report@TheDFIRReport·
How often do ya'll see emojis in command line params and can you detect them? Try hunting your environment using this sigma rule by @kostastsale - github.com/tsale/Sigma_ru… Was it easy or hard to hunt your env for emojis? Find anything? Thx to @0xToxin for sharing the sample!
The DFIR Report tweet media
English
2
24
75
0
Pierre ретвитнул
The DFIR Report
The DFIR Report@TheDFIRReport·
Emotet Strikes Again – LNK File Leads to Domain Wide Ransomware ➡️TTR: 154 hours ➡️Discovery: nltest, net group, ShareFinder, etc. ➡️Exfil: Rclone Transfer to Mega ➡️C2: CobaltStrike, AnyDesk, Tactical RMM Agent ➡️Impact: Quantum Ransomware thedfirreport.com/2022/11/28/emo… 1/X
English
1
145
271
0
Pierre ретвитнул
The DFIR Report
The DFIR Report@TheDFIRReport·
BumbleBee Zeros in on Meterpreter ➡️Initial Access: Contact Forms/Stolen Images/ISO ➡️PrivEsc: WSReset & Slui UAC Bypass, Zerologon CVE2020-1472 ➡️Cred Access: Procdump LSASS, reg dump SAM/SEC/SYS hives ➡️C2: BumbleBee, Meterpreter, CobaltStrike thedfirreport.com/2022/11/14/bum… 1/X
English
1
107
211
0
Pierre ретвитнул
The DFIR Report
The DFIR Report@TheDFIRReport·
Follina Exploit Leads to Domain Compromise ➡️Initial Access: Word Doc exploiting Follina ➡️Persistence: Scheduled Tasks ➡️Discovery: ADFind, Netscan, etc. ➡️Lat Movement: SMB, Service Creation, RDP ➡️C2: #CobaltStrike, Qbot, NetSupport, Atera/Splashtop thedfirreport.com/2022/10/31/fol…
English
3
177
368
0
Pierre ретвитнул
The DFIR Report
The DFIR Report@TheDFIRReport·
Dead or Alive? An Emotet Story ➡️Initial Access: Emotet XLS ➡️Persistence: RegRunKeys, Atera ➡️Discovery: LOLbins, AdFind, ShareFinder ➡️Credentials: LSASS access, Kerberoast ➡️Lateral: SMB, Remote Services ➡️C2: Emotet, CobaltStrike ➡️Exfil: Rclone/Mega thedfirreport.com/2022/09/12/dea…
English
5
120
287
0
Pierre ретвитнул
The DFIR Report
The DFIR Report@TheDFIRReport·
BumbleBee Roasts Its Way to Domain Admin ➡️Initial Access: BumbleBee (zipped ISO /w LNK+DLL) ➡️Persistence: AnyDesk ➡️Discovery: VulnRecon, Seatbelt, AdFind, etc. ➡️Credentials: Kerberoast, comsvcs.dll, ProcDump ➡️C2: BumbleBee, CobaltStrike, AnyDesk thedfirreport.com/2022/08/08/bum…
English
5
199
475
0
Pierre
Pierre@pigerlin·
Weaponized disk images files are still a thing. Are you able to detect ISO files being downloaded from the internet? ISO files being mounted by end users? Process and network connections being started from a mounted drive? Check out the importance in our latest report. #DFIR
The DFIR Report@TheDFIRReport

BumbleBee Roasts Its Way to Domain Admin ➡️Initial Access: BumbleBee (zipped ISO /w LNK+DLL) ➡️Persistence: AnyDesk ➡️Discovery: VulnRecon, Seatbelt, AdFind, etc. ➡️Credentials: Kerberoast, comsvcs.dll, ProcDump ➡️C2: BumbleBee, CobaltStrike, AnyDesk thedfirreport.com/2022/08/08/bum…

English
0
22
74
0
Pierre ретвитнул
The DFIR Report
The DFIR Report@TheDFIRReport·
Are you going to @Steel_Con Saturday (7/23)? If so, ➡️Check out @_pete_0's talk "Can you detect this? Inside The Ransomware Operator’s Toolkit" at 14:00 in Track 3! ➡️Find @_pete_0 and he'll give you a free t-shirt! while supplies last
The DFIR Report tweet media
English
0
17
29
0
Pierre ретвитнул
The DFIR Report
The DFIR Report@TheDFIRReport·
SELECT XMRig FROM SQLServer ➡️Initial Access: Brute Force ➡️Execution: xp_cmdshell, batch scripts, certutil ➡️Persistence: Hidden accounts, schtasks, WMI event subscription via mof files ➡️Defense Evasion: Kill AVs, Disabling UAC ➡️Impact: XMRig Miner thedfirreport.com/2022/07/11/sel…
The DFIR Report tweet mediaThe DFIR Report tweet mediaThe DFIR Report tweet mediaThe DFIR Report tweet media
English
1
90
205
0
Pierre ретвитнул
The DFIR Report
The DFIR Report@TheDFIRReport·
Can you Detect This? | Inside The Ransomware Operator's Toolkit ➡️@_pete_0 and @yatinwad will be presenting @ 14:40 UTC on 6/16. Sign up for the free #RansomwareSummit ⬇️ sans.org/cyber-security…
The DFIR Report tweet media
Jorge Orchilles@jorgeorchilles

Have you registered for the free #RansomwareSummit It is going to be awesome! I had the privilege of working with speakers for 2 different talks and so excited for them. One is from @TheDFIRReport which you all know I am a huge fan of. #ransomware sans.org/cyber-security…

English
1
18
67
0