Microsoft Exchange – ProxyLogon Vulnerability AnalysisThe goal of this case study is to summarize technical details of the ProxyLogon vulnerability alongside with other vulnerabilities that... KNOWLEDGE CENTER Case Study Detecting Malware Capabilities With capa egregor egregor ransomware Malware Analysis Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is... Case Study phishing ryuk ryuk ransomware Ryuk Ransomware In The Healthcare Sector zbot The Assassin Squad: Zbot and RYUK October 29, 2020 Overview During recent months, there have been large outbreaks of the Ryuk ransomware. Armed with upgrades and modifications in comparison... Case Study exploitation of vulnerable network devices REvil Sodinokibi Ransomware REvil/Sodinokibi Ransomware group REvil Sodinokibi Ransomware September 23, 2020 Overview During a recent client engagement, the LIFARS DFIR team encountered the REvil/Sodinokibi Ransomware group. The typical attack vector chosen... Case Study Effectiveness of our client’s security implementations red team engagements red teaming Red Teaming Case Study August 6, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts red team engagements and penetration tests evaluating whether... capability to reboot affected devices into Safe Mode Case Study Malware Analysis Case Study Snatch Ransomware Snatch Ransomware – Malware Analysis Case Study July 29, 2020 Overview. During last month LIFARS DFIR Team encountered various variants of Snatch Ransomware. This ransomware is known for its capability... Case Study Clipper AutoIt v2 LIFARS DFIR Team discovered QUILCLIPPER AutoIt Malware Qulab Stealer and Clipper malware Clipper AutoIt v2 – QUILCLIPPER AutoIt Malware July 1, 2020 Overview. During a recent engagement, the LIFARS DFIR Team discovered a sample of rare malware, which uses not very common techniques. It turns out that... Case Study Cryptocurrency Miners Threat Actors Use Targeted Attack XMRig-based CoinMiners by Blue Mockingbird group Cryptocurrency Miners – XMRig Based CoinMiner by Blue Mockingbird Group June 1, 2020 Since the end of March LIFARS DFIR team has observed an increase in the number of incidents related to Monero... Case Study LIFARS Pen Testing Team VPN Security VPN Solution Security Case Study VPN Solution Security Testing VPN Solution Security Testing April 30, 2020 In April, our client requested LIFARS Pen Testing Team to perform an authenticated black-box penetration test of the VPN solution... Case Study LIFARS Pen Testing Team LIFARS Tech Diary Session hijacking attack What is Session Hijacking? Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems... Advanced Persistent Threat APT41 APT41 – A spy who steals or a thief who spies Case Study Cyber indictments cases LIFARS Tech Diary nation-state actor becomes a cybercriminal Spy Who Encrypted Me APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of... Case Study Cyber Incident Response Tools Data Breach Response evil corp Incident Response Retainer LIFARS Tech Diary Osquery for Cyber Incident Response Osquery for Cyber Threat Detection and DFIR Osquery for Cyber Incident Response March 19, 2020 In this case study we demonstrate the use of Osquery framework for cyber security incident response.In this case study we... Case Study Extract used plaintext passwords How to Crack Password LIFARS Password Cracking Password Cracking Password Cracking Case Study LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former... Case Study Technical Tools Voltaire - Open Source Tool for Cyber Incident Response What does Voltaire/Voila do? What is Voltaire/Voila? Voltaire – New Tool for Cyber Incident Response from LIFARS March 10, 2020 What is Voltaire/Voila? At LIFARS, we process memory images as part of our incident response process. In these cases, it... Case Study Cyber Resilience Experts internet facing infrastructure LIFARS Pen Testing Team Man-in-the-middle (MiTM) attacks NAC Bypass and ARP Spoofing NAC Bypass and ARP Spoofing – Case Study February 17, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up... Case Study Cisco and Fortinet Hacking Cisco Hacking Cyber Resilience Experts Fortinet FortiOS Fortinet Hacking penetration tests evaluating Cisco and Fortinet Hacking – Case Study February 9, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up...
Microsoft Exchange – ProxyLogon Vulnerability AnalysisThe goal of this case study is to summarize technical details of the ProxyLogon vulnerability alongside with other vulnerabilities that...
KNOWLEDGE CENTER Case Study Detecting Malware Capabilities With capa egregor egregor ransomware Malware Analysis Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is... Case Study phishing ryuk ryuk ransomware Ryuk Ransomware In The Healthcare Sector zbot The Assassin Squad: Zbot and RYUK October 29, 2020 Overview During recent months, there have been large outbreaks of the Ryuk ransomware. Armed with upgrades and modifications in comparison... Case Study exploitation of vulnerable network devices REvil Sodinokibi Ransomware REvil/Sodinokibi Ransomware group REvil Sodinokibi Ransomware September 23, 2020 Overview During a recent client engagement, the LIFARS DFIR team encountered the REvil/Sodinokibi Ransomware group. The typical attack vector chosen... Case Study Effectiveness of our client’s security implementations red team engagements red teaming Red Teaming Case Study August 6, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts red team engagements and penetration tests evaluating whether... capability to reboot affected devices into Safe Mode Case Study Malware Analysis Case Study Snatch Ransomware Snatch Ransomware – Malware Analysis Case Study July 29, 2020 Overview. During last month LIFARS DFIR Team encountered various variants of Snatch Ransomware. This ransomware is known for its capability... Case Study Clipper AutoIt v2 LIFARS DFIR Team discovered QUILCLIPPER AutoIt Malware Qulab Stealer and Clipper malware Clipper AutoIt v2 – QUILCLIPPER AutoIt Malware July 1, 2020 Overview. During a recent engagement, the LIFARS DFIR Team discovered a sample of rare malware, which uses not very common techniques. It turns out that... Case Study Cryptocurrency Miners Threat Actors Use Targeted Attack XMRig-based CoinMiners by Blue Mockingbird group Cryptocurrency Miners – XMRig Based CoinMiner by Blue Mockingbird Group June 1, 2020 Since the end of March LIFARS DFIR team has observed an increase in the number of incidents related to Monero... Case Study LIFARS Pen Testing Team VPN Security VPN Solution Security Case Study VPN Solution Security Testing VPN Solution Security Testing April 30, 2020 In April, our client requested LIFARS Pen Testing Team to perform an authenticated black-box penetration test of the VPN solution... Case Study LIFARS Pen Testing Team LIFARS Tech Diary Session hijacking attack What is Session Hijacking? Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems... Advanced Persistent Threat APT41 APT41 – A spy who steals or a thief who spies Case Study Cyber indictments cases LIFARS Tech Diary nation-state actor becomes a cybercriminal Spy Who Encrypted Me APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of... Case Study Cyber Incident Response Tools Data Breach Response evil corp Incident Response Retainer LIFARS Tech Diary Osquery for Cyber Incident Response Osquery for Cyber Threat Detection and DFIR Osquery for Cyber Incident Response March 19, 2020 In this case study we demonstrate the use of Osquery framework for cyber security incident response.In this case study we... Case Study Extract used plaintext passwords How to Crack Password LIFARS Password Cracking Password Cracking Password Cracking Case Study LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former... Case Study Technical Tools Voltaire - Open Source Tool for Cyber Incident Response What does Voltaire/Voila do? What is Voltaire/Voila? Voltaire – New Tool for Cyber Incident Response from LIFARS March 10, 2020 What is Voltaire/Voila? At LIFARS, we process memory images as part of our incident response process. In these cases, it... Case Study Cyber Resilience Experts internet facing infrastructure LIFARS Pen Testing Team Man-in-the-middle (MiTM) attacks NAC Bypass and ARP Spoofing NAC Bypass and ARP Spoofing – Case Study February 17, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up... Case Study Cisco and Fortinet Hacking Cisco Hacking Cyber Resilience Experts Fortinet FortiOS Fortinet Hacking penetration tests evaluating Cisco and Fortinet Hacking – Case Study February 9, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up...
Case Study Detecting Malware Capabilities With capa egregor egregor ransomware Malware Analysis Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is...
Case Study phishing ryuk ryuk ransomware Ryuk Ransomware In The Healthcare Sector zbot The Assassin Squad: Zbot and RYUK October 29, 2020 Overview During recent months, there have been large outbreaks of the Ryuk ransomware. Armed with upgrades and modifications in comparison...
Case Study exploitation of vulnerable network devices REvil Sodinokibi Ransomware REvil/Sodinokibi Ransomware group REvil Sodinokibi Ransomware September 23, 2020 Overview During a recent client engagement, the LIFARS DFIR team encountered the REvil/Sodinokibi Ransomware group. The typical attack vector chosen...
Case Study Effectiveness of our client’s security implementations red team engagements red teaming Red Teaming Case Study August 6, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts red team engagements and penetration tests evaluating whether...
capability to reboot affected devices into Safe Mode Case Study Malware Analysis Case Study Snatch Ransomware Snatch Ransomware – Malware Analysis Case Study July 29, 2020 Overview. During last month LIFARS DFIR Team encountered various variants of Snatch Ransomware. This ransomware is known for its capability...
Case Study Clipper AutoIt v2 LIFARS DFIR Team discovered QUILCLIPPER AutoIt Malware Qulab Stealer and Clipper malware Clipper AutoIt v2 – QUILCLIPPER AutoIt Malware July 1, 2020 Overview. During a recent engagement, the LIFARS DFIR Team discovered a sample of rare malware, which uses not very common techniques. It turns out that...
Case Study Cryptocurrency Miners Threat Actors Use Targeted Attack XMRig-based CoinMiners by Blue Mockingbird group Cryptocurrency Miners – XMRig Based CoinMiner by Blue Mockingbird Group June 1, 2020 Since the end of March LIFARS DFIR team has observed an increase in the number of incidents related to Monero...
Case Study LIFARS Pen Testing Team VPN Security VPN Solution Security Case Study VPN Solution Security Testing VPN Solution Security Testing April 30, 2020 In April, our client requested LIFARS Pen Testing Team to perform an authenticated black-box penetration test of the VPN solution...
Case Study LIFARS Pen Testing Team LIFARS Tech Diary Session hijacking attack What is Session Hijacking? Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems...
Advanced Persistent Threat APT41 APT41 – A spy who steals or a thief who spies Case Study Cyber indictments cases LIFARS Tech Diary nation-state actor becomes a cybercriminal Spy Who Encrypted Me APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of...
Case Study Cyber Incident Response Tools Data Breach Response evil corp Incident Response Retainer LIFARS Tech Diary Osquery for Cyber Incident Response Osquery for Cyber Threat Detection and DFIR Osquery for Cyber Incident Response March 19, 2020 In this case study we demonstrate the use of Osquery framework for cyber security incident response.In this case study we...
Case Study Extract used plaintext passwords How to Crack Password LIFARS Password Cracking Password Cracking Password Cracking Case Study LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former...
Case Study Technical Tools Voltaire - Open Source Tool for Cyber Incident Response What does Voltaire/Voila do? What is Voltaire/Voila? Voltaire – New Tool for Cyber Incident Response from LIFARS March 10, 2020 What is Voltaire/Voila? At LIFARS, we process memory images as part of our incident response process. In these cases, it...
Case Study Cyber Resilience Experts internet facing infrastructure LIFARS Pen Testing Team Man-in-the-middle (MiTM) attacks NAC Bypass and ARP Spoofing NAC Bypass and ARP Spoofing – Case Study February 17, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up...
Case Study Cisco and Fortinet Hacking Cisco Hacking Cyber Resilience Experts Fortinet FortiOS Fortinet Hacking penetration tests evaluating Cisco and Fortinet Hacking – Case Study February 9, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up...