The DFIR Report Real Intrusions

Real Intrusions by Real Attackers, The Truth Behind the Intrusion.

The DFIR Report Actionable Cyber Threat Intelligence

  • Apache ActiveMQ Exploit Leads to LockBit Ransomware
    by editor on February 23, 2026 at 2:09 pm

    Key Takeaways An audio version of this report can be found on Spotify, Apple, YouTube, Audible, & Amazon.  This intrusion began in mid-February 2024 after a threat actor exploited a vulnerability (CVE-2023-46604) on an exposed Apache ActiveMQ server. The threat actor was able to perform remote code execution (RCE) by using a Java Spring class and a custom Java Spring The post Apache ActiveMQ Exploit Leads to LockBit Ransomware appeared first on The DFIR Report.

  • Cat’s Got Your Files: Lynx Ransomware
    by editor on December 17, 2025 at 7:07 pm

    Key Takeaways The DFIR Report Services Contact us today for pricing or a demo! The intrusion began in early March 2025 with a single successful Remote Desktop Protocol (RDP) logon to an internet-exposed system. Notably, there was no evidence of credential stuffing, brute forcing, or other failed authentication attempts from the source IP, indicating the The post Cat’s Got Your Files: Lynx Ransomware appeared first on The DFIR Report.

  • From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira
    by editor on November 4, 2025 at 9:30 pm

    Overview Bumblebee malware has been an initial access tool used by threat actors since late 2021. In 2023 the malware was first reported as using SEO poisoning as a delivery mechanism. Recently in May of 2025 Cyjax reported on a campaign using this method again, impersonating various IT tools. We observed a similar campaign in The post From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira appeared first on The DFIR Report.

  • From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion
    by editor on September 29, 2025 at 2:30 pm

    Key Takeaways Private Threat Briefs: 20+ private DFIR reports annually.   Contact us today for pricing or a demo!   Table of Contents: Case Summary Analysts Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Command and Control Exfiltration Impact Timeline Diamond Model Indicators Detections MITRE ATT&CK   Case Summary The intrusion The post From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion appeared first on The DFIR Report.

  • Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs
    by editor on September 8, 2025 at 2:20 pm

    Key Takeaways Private Threat Briefs: 20+ private DFIR reports annually. Contact us today for pricing or a demo! Table of Contents: Case Summary Analysts Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact Timeline Diamond Model Indicators Detections MITRE ATT&CK Case Summary The intrusion began in The post Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs appeared first on The DFIR Report.

  • KongTuke FileFix Leads to New Interlock RAT Variant
    by editor on July 14, 2025 at 12:50 am

    Researchers from The DFIR Report, in partnership with Proofpoint, have identified a new and resilient variant of the Interlock ransomware group’s remote access trojan (RAT). This new malware, a shift from the previously identified JavaScript-based Interlock RAT (aka NodeSnake), uses PHP and is being used in a widespread campaign. Since May 2025, activity related to The post KongTuke FileFix Leads to New Interlock RAT Variant appeared first on The DFIR Report.

  • Hide Your RDP: Password Spray Leads to RansomHub Deployment
    by editor on June 30, 2025 at 12:20 am

    Key Takeaways Case Summary This intrusion began in November 2024 with a password spray attack targeting an internet-facing RDP server. Over the course of several hours, the threat actor attempted logins against multiple accounts using known malicious IPs (based on OSINT). Several hours later they then logged in via RDP with one of the previously The post Hide Your RDP: Password Spray Leads to RansomHub Deployment appeared first on The DFIR Report.

  • Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware
    by editor on May 19, 2025 at 12:05 am

    Key Takeaways The DFIR Report Services Table of Contents: Case Summary In late June 2024, an unpatched Confluence server was compromised via CVE-2023-22527, a template injection vulnerability, first from IP address 45.227.254[.]124, which just ran whoami and exited. Shortly thereafter, a different IP address used the same exploit, running curl to deploy a Metasploit payload The post Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware appeared first on The DFIR Report.

  • Navigating Through The Fog
    by editor on April 28, 2025 at 12:03 am

    Key Takeaways An open directory associated with a ransomware affiliate, likely linked to the Fog ransomware group, was discovered in December 2024. It contained tools and scripts for reconnaissance, exploitation, lateral movement, and persistence… The post Navigating Through The Fog appeared first on The DFIR Report.

  • Fake Zoom Ends in BlackSuit Ransomware
    by editor on March 31, 2025 at 12:01 am

    Key Takeaways Case Summary This case from May 2024 started with a malicious download from a website mimicking the teleconferencing application Zoom. When visiting the website and downloading a file that seems intended for installing Zoom, the user was, in fact, installing a malicious program created with Inno Setup. The malicious program was a d3f@ck The post Fake Zoom Ends in BlackSuit Ransomware appeared first on The DFIR Report.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.