The DFIR Report Real Intrusions

Real Intrusions by Real Attackers, The Truth Behind the Intrusion.

The DFIR Report Real Intrusions by Real Attackers, The Truth Behind the Intrusion

  • From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira
    by editor on August 5, 2025 at 12:00 pm

    Overview Bumblebee malware has been an initial access tool used by threat actors since late 2021. In 2023 the malware was first reported as using SEO poisoning as a delivery … Read More

  • KongTuke FileFix Leads to New Interlock RAT Variant
    by editor on July 14, 2025 at 12:50 am

    Researchers from The DFIR Report, in partnership with Proofpoint, have identified a new and resilient variant of the Interlock ransomware group’s remote access trojan (RAT). This new malware, a shift … Read More

  • Hide Your RDP: Password Spray Leads to RansomHub Deployment
    by editor on June 30, 2025 at 12:20 am

    Key Takeaways Case Summary This intrusion began in November 2024 with a password spray attack targeting an internet-facing RDP server. Over the course of several hours, the threat actor attempted … Read More

  • Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware
    by editor on May 19, 2025 at 12:05 am

    Key Takeaways The DFIR Report Services Table of Contents: Case Summary In late June 2024, an unpatched Confluence server was compromised via CVE-2023-22527, a template injection vulnerability, first from IP … Read More

  • Navigating Through The Fog
    by editor on April 28, 2025 at 12:03 am

    Key Takeaways An open directory associated with a ransomware affiliate, likely linked to the Fog ransomware group, was discovered in December 2024. It contained tools and scripts for reconnaissance, exploitation, lateral movement, and persistence…

  • Fake Zoom Ends in BlackSuit Ransomware
    by editor on March 31, 2025 at 12:01 am

    Key Takeaways Case Summary This case from May 2024 started with a malicious download from a website mimicking the teleconferencing application Zoom. When visiting the website and downloading a file … Read More

  • Confluence Exploit Leads to LockBit Ransomware
    by editor on February 24, 2025 at 12:06 am

    Key Takeaways Case Summary The intrusion started with the exploitation of CVE-2023-22527, a critical remote code execution vulnerability in Confluence, against a Windows server. The first indication of threat actor … Read More

  • Cobalt Strike and a Pair of SOCKS Lead to LockBit Ransomware
    by editor on January 27, 2025 at 1:42 am

    Key Takeaways Case Summary This intrusion began near the end of January 2024 when the user downloaded and executed a file using the same name (setup_wm.exe) and executable icon, as … Read More

  • The Curious Case of an Egg-Cellent Resume
    by editor on December 2, 2024 at 1:50 am

    Key Takeaways Private Threat Briefs: Over 20 private DFIR reports annually. Threat Feed: Focuses on tracking Command and Control frameworks like Cobalt Strike, Metasploit, Sliver, etc. All Intel: Includes everything from … Read More

  • Inside the Open Directory of the “You Dun” Threat Group
    by editor on October 28, 2024 at 1:05 am

    Key Takeaways The DFIR Report Services Reports such as this one are part of our All Intel service and are categorized as Threat Actor Insights. Private Threat Briefs: Over 20 … Read More

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.