Wi-Fi Network Penetration Testing with a Synopsis of Ontology to Enhance the SecurityMost use the internet to send messages or documents (data) from point (A) to point (B). This is mainly done... KNOWLEDGE CENTER Case Study cyber cybersecurity LockBit ransomware Whitepaper A Detailed Analysis of the LockBit Ransomware February 24, 2022 LockBit 2.0 ransomware is one of the most active families in the wild and pretends to implement the fastest encryption... Case Study cybersecurity Grief Ransomware Whitepaper A Deep Dive into The Grief Ransomware’s Capabilities January 11, 2022 Grief ransomware is the successor of the DoppelPaymer ransomware, which emerged from the BitPaymer ransomware. Grief is deployed in an... Case Study Exchange server exploitation Microsoft Exchange ProxyLogon Vulnerability Remote Code Execution Microsoft Exchange – ProxyLogon Vulnerability Analysis March 18, 2021 The goal of this case study is to summarize technical details of the ProxyLogon vulnerability alongside with other vulnerabilities that... Case Study Detecting Malware Capabilities With capa egregor egregor ransomware Malware Analysis Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is... Case Study phishing ryuk ryuk ransomware Ryuk Ransomware In The Healthcare Sector zbot The Assassin Squad: Zbot and RYUK October 29, 2020 Overview During recent months, there have been large outbreaks of the Ryuk ransomware. Armed with upgrades and modifications in comparison... Case Study exploitation of vulnerable network devices REvil Sodinokibi Ransomware REvil/Sodinokibi Ransomware group REvil Sodinokibi Ransomware September 23, 2020 Overview During a recent client engagement, the LIFARS DFIR team encountered the REvil/Sodinokibi Ransomware group. The typical attack vector chosen... Case Study Effectiveness of our client’s security implementations red team engagements red teaming Red Teaming Case Study August 6, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts red team engagements and penetration tests evaluating whether... capability to reboot affected devices into Safe Mode Case Study Malware Analysis Case Study Snatch Ransomware Snatch Ransomware – Malware Analysis Case Study July 29, 2020 Overview. During last month LIFARS DFIR Team encountered various variants of Snatch Ransomware. This ransomware is known for its capability... Case Study Clipper AutoIt v2 LIFARS DFIR Team discovered QUILCLIPPER AutoIt Malware Qulab Stealer and Clipper malware Clipper AutoIt v2 – QUILCLIPPER AutoIt Malware July 1, 2020 Overview. During a recent engagement, the LIFARS DFIR Team discovered a sample of rare malware, which uses not very common techniques. It turns out that... Case Study Cryptocurrency Miners Threat Actors Use Targeted Attack XMRig-based CoinMiners by Blue Mockingbird group Cryptocurrency Miners – XMRig Based CoinMiner by Blue Mockingbird Group June 1, 2020 Since the end of March LIFARS DFIR team has observed an increase in the number of incidents related to Monero... Case Study LIFARS Pen Testing Team VPN Security VPN Solution Security Case Study VPN Solution Security Testing VPN Solution Security Testing April 30, 2020 In April, our client requested LIFARS Pen Testing Team to perform an authenticated black-box penetration test of the VPN solution... Case Study LIFARS Pen Testing Team LIFARS Tech Diary Session hijacking attack What is Session Hijacking? Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems... Advanced Persistent Threat APT41 APT41 – A spy who steals or a thief who spies Case Study Cyber indictments cases LIFARS Tech Diary nation-state actor becomes a cybercriminal Spy Who Encrypted Me APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of... Case Study Cyber Incident Response Tools Data Breach Response evil corp Incident Response Retainer LIFARS Tech Diary Osquery for Cyber Incident Response Osquery for Cyber Threat Detection and DFIR Osquery for Cyber Incident Response March 19, 2020 In this case study we demonstrate the use of Osquery framework for cyber security incident response.In this case study we... Case Study Extract used plaintext passwords How to Crack Password LIFARS Password Cracking Password Cracking Password Cracking Case Study LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former...
Wi-Fi Network Penetration Testing with a Synopsis of Ontology to Enhance the SecurityMost use the internet to send messages or documents (data) from point (A) to point (B). This is mainly done...
KNOWLEDGE CENTER Case Study cyber cybersecurity LockBit ransomware Whitepaper A Detailed Analysis of the LockBit Ransomware February 24, 2022 LockBit 2.0 ransomware is one of the most active families in the wild and pretends to implement the fastest encryption... Case Study cybersecurity Grief Ransomware Whitepaper A Deep Dive into The Grief Ransomware’s Capabilities January 11, 2022 Grief ransomware is the successor of the DoppelPaymer ransomware, which emerged from the BitPaymer ransomware. Grief is deployed in an... Case Study Exchange server exploitation Microsoft Exchange ProxyLogon Vulnerability Remote Code Execution Microsoft Exchange – ProxyLogon Vulnerability Analysis March 18, 2021 The goal of this case study is to summarize technical details of the ProxyLogon vulnerability alongside with other vulnerabilities that... Case Study Detecting Malware Capabilities With capa egregor egregor ransomware Malware Analysis Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is... Case Study phishing ryuk ryuk ransomware Ryuk Ransomware In The Healthcare Sector zbot The Assassin Squad: Zbot and RYUK October 29, 2020 Overview During recent months, there have been large outbreaks of the Ryuk ransomware. Armed with upgrades and modifications in comparison... Case Study exploitation of vulnerable network devices REvil Sodinokibi Ransomware REvil/Sodinokibi Ransomware group REvil Sodinokibi Ransomware September 23, 2020 Overview During a recent client engagement, the LIFARS DFIR team encountered the REvil/Sodinokibi Ransomware group. The typical attack vector chosen... Case Study Effectiveness of our client’s security implementations red team engagements red teaming Red Teaming Case Study August 6, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts red team engagements and penetration tests evaluating whether... capability to reboot affected devices into Safe Mode Case Study Malware Analysis Case Study Snatch Ransomware Snatch Ransomware – Malware Analysis Case Study July 29, 2020 Overview. During last month LIFARS DFIR Team encountered various variants of Snatch Ransomware. This ransomware is known for its capability... Case Study Clipper AutoIt v2 LIFARS DFIR Team discovered QUILCLIPPER AutoIt Malware Qulab Stealer and Clipper malware Clipper AutoIt v2 – QUILCLIPPER AutoIt Malware July 1, 2020 Overview. During a recent engagement, the LIFARS DFIR Team discovered a sample of rare malware, which uses not very common techniques. It turns out that... Case Study Cryptocurrency Miners Threat Actors Use Targeted Attack XMRig-based CoinMiners by Blue Mockingbird group Cryptocurrency Miners – XMRig Based CoinMiner by Blue Mockingbird Group June 1, 2020 Since the end of March LIFARS DFIR team has observed an increase in the number of incidents related to Monero... Case Study LIFARS Pen Testing Team VPN Security VPN Solution Security Case Study VPN Solution Security Testing VPN Solution Security Testing April 30, 2020 In April, our client requested LIFARS Pen Testing Team to perform an authenticated black-box penetration test of the VPN solution... Case Study LIFARS Pen Testing Team LIFARS Tech Diary Session hijacking attack What is Session Hijacking? Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems... Advanced Persistent Threat APT41 APT41 – A spy who steals or a thief who spies Case Study Cyber indictments cases LIFARS Tech Diary nation-state actor becomes a cybercriminal Spy Who Encrypted Me APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of... Case Study Cyber Incident Response Tools Data Breach Response evil corp Incident Response Retainer LIFARS Tech Diary Osquery for Cyber Incident Response Osquery for Cyber Threat Detection and DFIR Osquery for Cyber Incident Response March 19, 2020 In this case study we demonstrate the use of Osquery framework for cyber security incident response.In this case study we... Case Study Extract used plaintext passwords How to Crack Password LIFARS Password Cracking Password Cracking Password Cracking Case Study LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former...
Case Study cyber cybersecurity LockBit ransomware Whitepaper A Detailed Analysis of the LockBit Ransomware February 24, 2022 LockBit 2.0 ransomware is one of the most active families in the wild and pretends to implement the fastest encryption...
Case Study cybersecurity Grief Ransomware Whitepaper A Deep Dive into The Grief Ransomware’s Capabilities January 11, 2022 Grief ransomware is the successor of the DoppelPaymer ransomware, which emerged from the BitPaymer ransomware. Grief is deployed in an...
Case Study Exchange server exploitation Microsoft Exchange ProxyLogon Vulnerability Remote Code Execution Microsoft Exchange – ProxyLogon Vulnerability Analysis March 18, 2021 The goal of this case study is to summarize technical details of the ProxyLogon vulnerability alongside with other vulnerabilities that...
Case Study Detecting Malware Capabilities With capa egregor egregor ransomware Malware Analysis Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is...
Case Study phishing ryuk ryuk ransomware Ryuk Ransomware In The Healthcare Sector zbot The Assassin Squad: Zbot and RYUK October 29, 2020 Overview During recent months, there have been large outbreaks of the Ryuk ransomware. Armed with upgrades and modifications in comparison...
Case Study exploitation of vulnerable network devices REvil Sodinokibi Ransomware REvil/Sodinokibi Ransomware group REvil Sodinokibi Ransomware September 23, 2020 Overview During a recent client engagement, the LIFARS DFIR team encountered the REvil/Sodinokibi Ransomware group. The typical attack vector chosen...
Case Study Effectiveness of our client’s security implementations red team engagements red teaming Red Teaming Case Study August 6, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts red team engagements and penetration tests evaluating whether...
capability to reboot affected devices into Safe Mode Case Study Malware Analysis Case Study Snatch Ransomware Snatch Ransomware – Malware Analysis Case Study July 29, 2020 Overview. During last month LIFARS DFIR Team encountered various variants of Snatch Ransomware. This ransomware is known for its capability...
Case Study Clipper AutoIt v2 LIFARS DFIR Team discovered QUILCLIPPER AutoIt Malware Qulab Stealer and Clipper malware Clipper AutoIt v2 – QUILCLIPPER AutoIt Malware July 1, 2020 Overview. During a recent engagement, the LIFARS DFIR Team discovered a sample of rare malware, which uses not very common techniques. It turns out that...
Case Study Cryptocurrency Miners Threat Actors Use Targeted Attack XMRig-based CoinMiners by Blue Mockingbird group Cryptocurrency Miners – XMRig Based CoinMiner by Blue Mockingbird Group June 1, 2020 Since the end of March LIFARS DFIR team has observed an increase in the number of incidents related to Monero...
Case Study LIFARS Pen Testing Team VPN Security VPN Solution Security Case Study VPN Solution Security Testing VPN Solution Security Testing April 30, 2020 In April, our client requested LIFARS Pen Testing Team to perform an authenticated black-box penetration test of the VPN solution...
Case Study LIFARS Pen Testing Team LIFARS Tech Diary Session hijacking attack What is Session Hijacking? Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems...
Advanced Persistent Threat APT41 APT41 – A spy who steals or a thief who spies Case Study Cyber indictments cases LIFARS Tech Diary nation-state actor becomes a cybercriminal Spy Who Encrypted Me APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of...
Case Study Cyber Incident Response Tools Data Breach Response evil corp Incident Response Retainer LIFARS Tech Diary Osquery for Cyber Incident Response Osquery for Cyber Threat Detection and DFIR Osquery for Cyber Incident Response March 19, 2020 In this case study we demonstrate the use of Osquery framework for cyber security incident response.In this case study we...
Case Study Extract used plaintext passwords How to Crack Password LIFARS Password Cracking Password Cracking Password Cracking Case Study LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former...