Pierre

71 posts

Pierre banner
Pierre

Pierre

@pigerlin

Analyst @TheDFIRReport | Passionate about all things DFIR 🇳🇱

Sumali Nisan 2011
137 Sinusundan753 Mga Tagasunod
Pierre nag-retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
🌟New report out today!🌟 From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion Analysis/reporting completed by @RussianPanda, Christos Fotopoulos, Salem Salem, reviewed by @svch0st. Audio: Available on Spotify, Apple, YouTube and more! Report:⬇️
The DFIR Report tweet media
English
5
53
153
49.6K
Pierre nag-retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
New report out Monday 12/4 by @yatinwad! ➡️This intrusion starts with a MSSQL server being brute forced and ends in BlueSky ransomware. ➡️The threat actor went from initial access to network wide ransomware in under 1 hour.
The DFIR Report tweet media
English
2
15
50
9K
Pierre nag-retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
HTML Smuggling Leads to Domain Wide Ransomware ➡️Initial Access: Thread-Hijacked Email > HTML Attachment ➡️Credentials: LSASS Access, SessionGopher ➡️Lateral Movement: RDP, PsExec ➡️C2: IcedID, Cobalt Strike ➡️Impact: Nokoyawa Ransomware thedfirreport.com/2023/08/28/htm… 1/X
English
5
165
372
96.9K
Pierre nag-retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
A Truly Graceful Wipe Out ➡️Initial Access: Email > TDS > Truebot download ➡️Credentials: LSASS & Registry Dump ➡️Persistence: Scheduled Task ➡️C2: Truebot, FlawedGrace, Cobalt Strike ➡️Exfiltration: FlawedGrace ➡️Impact: MBR Killer thedfirreport.com/2023/06/12/a-t… 1/X
English
1
159
348
86.1K
Pierre nag-retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
Here's an interesting batch script you'll see in an upcoming report: ➡️Do you know what it's doing? ➡️Would you struggle to do analysis on a system if it ran? Why or Why not? ➡️Are there any rules available to detect this activity? Post your answers below
The DFIR Report tweet media
English
25
40
148
61K
Pierre nag-retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
Unwrapping Ursnifs Gifts ➡️Initial Access: Ursnif ISO/LNK/DLL ➡️Discovery: Get-ADComputer, nltest, net view, etc. ➡️Credentials: LSASS access ➡️Lateral: Impacket ➡️Persistence: Registry Run Key ➡️C2: Ursnif, Cobalt Strike thedfirreport.com/2023/01/09/unw… 1/X
English
1
94
227
50.7K
Pierre nag-retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
How often do ya'll see emojis in command line params and can you detect them? Try hunting your environment using this sigma rule by @kostastsale - github.com/tsale/Sigma_ru… Was it easy or hard to hunt your env for emojis? Find anything? Thx to @0xToxin for sharing the sample!
The DFIR Report tweet media
English
2
24
75
0
Pierre nag-retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
Emotet Strikes Again – LNK File Leads to Domain Wide Ransomware ➡️TTR: 154 hours ➡️Discovery: nltest, net group, ShareFinder, etc. ➡️Exfil: Rclone Transfer to Mega ➡️C2: CobaltStrike, AnyDesk, Tactical RMM Agent ➡️Impact: Quantum Ransomware thedfirreport.com/2022/11/28/emo… 1/X
English
1
145
271
0
Pierre nag-retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
BumbleBee Zeros in on Meterpreter ➡️Initial Access: Contact Forms/Stolen Images/ISO ➡️PrivEsc: WSReset & Slui UAC Bypass, Zerologon CVE2020-1472 ➡️Cred Access: Procdump LSASS, reg dump SAM/SEC/SYS hives ➡️C2: BumbleBee, Meterpreter, CobaltStrike thedfirreport.com/2022/11/14/bum… 1/X
English
1
107
211
0
Pierre nag-retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
Follina Exploit Leads to Domain Compromise ➡️Initial Access: Word Doc exploiting Follina ➡️Persistence: Scheduled Tasks ➡️Discovery: ADFind, Netscan, etc. ➡️Lat Movement: SMB, Service Creation, RDP ➡️C2: #CobaltStrike, Qbot, NetSupport, Atera/Splashtop thedfirreport.com/2022/10/31/fol…
English
3
177
368
0
Pierre nag-retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
Dead or Alive? An Emotet Story ➡️Initial Access: Emotet XLS ➡️Persistence: RegRunKeys, Atera ➡️Discovery: LOLbins, AdFind, ShareFinder ➡️Credentials: LSASS access, Kerberoast ➡️Lateral: SMB, Remote Services ➡️C2: Emotet, CobaltStrike ➡️Exfil: Rclone/Mega thedfirreport.com/2022/09/12/dea…
English
5
120
287
0
Pierre nag-retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
BumbleBee Roasts Its Way to Domain Admin ➡️Initial Access: BumbleBee (zipped ISO /w LNK+DLL) ➡️Persistence: AnyDesk ➡️Discovery: VulnRecon, Seatbelt, AdFind, etc. ➡️Credentials: Kerberoast, comsvcs.dll, ProcDump ➡️C2: BumbleBee, CobaltStrike, AnyDesk thedfirreport.com/2022/08/08/bum…
English
5
199
475
0
Pierre
Pierre@pigerlin·
Weaponized disk images files are still a thing. Are you able to detect ISO files being downloaded from the internet? ISO files being mounted by end users? Process and network connections being started from a mounted drive? Check out the importance in our latest report. #DFIR
The DFIR Report@TheDFIRReport

BumbleBee Roasts Its Way to Domain Admin ➡️Initial Access: BumbleBee (zipped ISO /w LNK+DLL) ➡️Persistence: AnyDesk ➡️Discovery: VulnRecon, Seatbelt, AdFind, etc. ➡️Credentials: Kerberoast, comsvcs.dll, ProcDump ➡️C2: BumbleBee, CobaltStrike, AnyDesk thedfirreport.com/2022/08/08/bum…

English
0
22
74
0
Pierre nag-retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
Are you going to @Steel_Con Saturday (7/23)? If so, ➡️Check out @_pete_0's talk "Can you detect this? Inside The Ransomware Operator’s Toolkit" at 14:00 in Track 3! ➡️Find @_pete_0 and he'll give you a free t-shirt! while supplies last
The DFIR Report tweet media
English
0
17
29
0
Pierre nag-retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
SELECT XMRig FROM SQLServer ➡️Initial Access: Brute Force ➡️Execution: xp_cmdshell, batch scripts, certutil ➡️Persistence: Hidden accounts, schtasks, WMI event subscription via mof files ➡️Defense Evasion: Kill AVs, Disabling UAC ➡️Impact: XMRig Miner thedfirreport.com/2022/07/11/sel…
The DFIR Report tweet mediaThe DFIR Report tweet mediaThe DFIR Report tweet mediaThe DFIR Report tweet media
English
1
90
205
0
Pierre nag-retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
Can you Detect This? | Inside The Ransomware Operator's Toolkit ➡️@_pete_0 and @yatinwad will be presenting @ 14:40 UTC on 6/16. Sign up for the free #RansomwareSummit ⬇️ sans.org/cyber-security…
The DFIR Report tweet media
Jorge Orchilles@jorgeorchilles

Have you registered for the free #RansomwareSummit It is going to be awesome! I had the privilege of working with speakers for 2 different talks and so excited for them. One is from @TheDFIRReport which you all know I am a huge fan of. #ransomware sans.org/cyber-security…

English
1
18
67
0