🚨 Possible first Iranian wiper activity since the start of the war.
Handala (MOIS-linked) claims targeting Stryker Corporation, reportedly pushing a wiper to Intune-managed endpoints.
Claims currently unverified but seeing more public reporting on it.
Now, who's got samples for analysis?
11.03.2026 13:13
👍 0
🔁 0
💬 0
📌 0
They Came to Spy on America. They Stayed to Coach Little League.
In the wake of the Cold War, some Soviet bloc spies decided their fake American lives weren’t so bad.
It’s no secret that investigative journalism is on life support. The economics of the profession, always shaky, have become increasingly untenable. If you enjoyed this, or any of my other work, and are looking for a full-time editor or writer, get in touch!
www.politico.com/news/magazin...
10.03.2026 19:36
👍 72
🔁 26
💬 1
📌 0
☁️ 🧪 We've been cooking in the lab!
In our new scenario you can play with EKS, ECR, pipelines and more fun stuff in the cloud.
Sign up and take advantage of our #BlackFriday deal!
🔗cloudlabs.invictus-ir.com
#DFIR #Cloud #Training #cybersecurity
28.11.2025 11:30
👍 3
🔁 0
💬 0
📌 0
The story of how we almost got hacked
The VendorVandals threat actor tried to compromise us using a phishing lure + fake WeTransfer delivery to achieve a BEC attack.
We followed the breadcrumbs and exposed their campaign.
Details 👇
www.invictus-ir.com/news/the-sto...
26.11.2025 18:25
👍 1
🔁 0
💬 0
📌 0
🎉BEHOLD! THE AGENDA! 🎉
The inaugural agenda features 15 talks detailing operational updates on the threat landscape, matters of attribution, and unique explorations of unconventional manifestations of state presence.
Get registered quick!!!
stateofstatecraft.com/agenda
18.09.2025 16:39
👍 5
🔁 1
💬 0
📌 0
Cloud Labs - Choose the plan that fits your needs
Cloud Labs is live!
🏗️ Build or increase your cloud incident response skills with realistic labs and scenarios.
Register for Cloud Labs: cloudlabs.invictus-ir.com
29.08.2025 12:38
👍 0
🔁 0
💬 0
📌 0
Black Hat First Look: Meet the New Microsoft Extractor Suite v4
💙Microsoft Extractor Suite v4 is here
𝘜𝘱𝘥𝘢𝘵𝘦-𝘔𝘰𝘥𝘶𝘭𝘦 -𝘕𝘢𝘮𝘦 𝘔𝘪𝘤𝘳𝘰𝘴𝘰𝘧𝘵-𝘌𝘹𝘵𝘳𝘢𝘤𝘵𝘰𝘳-𝘚𝘶𝘪𝘵𝘦
Learn more about the new features in the blog and thanks everyone that contributed!
invictus-ir.com/news/black-h...
#stayInvictus #CloudIncidentResponse #DFIR
28.07.2025 09:48
👍 0
🔁 0
💬 0
📌 0
Why am I so unimpressed by these strikes? Israel and the US have failed to target significant elements of Iran's nuclear materials and production infrastructure. RISING LION and MIDNIGHT HAMMER are tactically brilliant, but may turn out to be strategic failures. 🧵 1/17
23.06.2025 01:25
👍 2883
🔁 1126
💬 92
📌 268
What’s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia | Google Cloud Blog
A Russia-sponsored threat actor is impersonating the U.S. Department of State, and using phishing to gain access to email accounts.
So @gabagool.ing (who will henceforth be referred to as "gabbot") and I wrote some stuff on some ASP phishing campaigns: cloud.google.com/blog/topics/...
Citizen Lab worked closely with one of the targets and shared their work on it also: citizenlab.ca/2025/06/russ...
18.06.2025 17:04
👍 10
🔁 7
💬 0
📌 2
#CharmingKitten #APT42 #TA453
Hash:
87144d0aa002a87376b673f7d0c0eb88
C2:
Telegram Bot used for error messages and auto-start messaging to the operator
computerlearning.ddns./net
Pivots:
bookstoragestore./com
lastfilterfile/.info
78.159.117./177
78.159.117./175
185.132.176./241
154.44.186./106
10.06.2025 11:47
👍 1
🔁 0
💬 0
📌 0
Dutch intelligence discover a new Russian APT—LAUNDRY BEAR
www.aivd.nl/documenten/p...
Microsoft calls it Void Blizzard. Their report is here: www.microsoft.com/en-us/securi...
27.05.2025 12:11
👍 21
🔁 12
💬 1
📌 1
The limited IOCs on this pointed toward an ORB network...nice to see some reporting that supports attribution.
24.05.2025 21:49
👍 1
🔁 0
💬 0
📌 0
High-level overview of JavaGhost's TTPs
This isn’t recycled noise on JavaGhost. It surfaces the often-overlooked details responders and CTI analysts actually need.
Practical takeaways include:
✔️ Mapped TTPs
✔️ IR checklist
✔️ Actor context & relevancy
invictus-ir.com/news/profili...
#CTI #CloudSecurity #AWS #DFIR #JavaGhost
22.05.2025 11:52
👍 1
🔁 0
💬 0
📌 0
Call-back Proxy Network: 103.131.213[.]89 | 182.185.156[.]45 – likely a mix of anonymous activity and normal activity.
Mass SMTP Tester: 134.199.148[.]132 – banner previously responded with Mass SMTP Tester header.
14.05.2025 12:46
👍 0
🔁 0
💬 0
📌 0
ATT&CK v17: New Platform (ESXi), Collection Optimization, & More Countermeasures
By: Amy Robertson and Adam Pennington
ATT&CK v17 is now live! This release includes the first version of the ESXi platform, a pile of defensive upgrades, and fresh content across Enterprise, Mobile, and ICS.
Check out our blog post describing the changes by Amy Robertson & @whatshisface.bsky.social at medium.com/mitre-attack....
22.04.2025 15:22
👍 6
🔁 2
💬 0
📌 1
Cloud Heavy, Hybrid Ready: Lessons from BlackBasta and Scattered Spider
🚨 New blog: BlackBasta’s leaks show how ransomware crews still exploit hybrid environments while Scattered Spider leans fully into cloud.
Two actors, two strategies. What it means for IR, cloud defense, and ransomware readiness.
👉 invictus-ir.com/news/cloud-h...
#DFIR #CloudSecurity #CTI
02.04.2025 12:57
👍 0
🔁 1
💬 0
📌 0
Cloud Incident Readiness: Key logs for cloud incidents
🔍 New Blog: Essential Cloud Logs for Incident Response
🪵 Are you collecting the right logs for cloud security incidents? We break down the must-have logs to detect, investigate, and respond effectively in the cloud.
🔗 www.invictus-ir.com/news/cloud-i...
#dfir #aws #microsoft #google
19.03.2025 12:53
👍 0
🔁 1
💬 0
📌 0
Deep Dive: Forensic Analysis of eM ClientPermissions Table
🚨 New Blog: Forensic Analysis of eM Client 🚨
If you handle BEC investigations, you've probably encountered eM Client more than once. We break down the forensic traces this application leaves behind.
🔍 Read now: www.invictus-ir.com/news/forensi...
#CyberSecurity #DFIR #BEC #ThreatIntel #CTI
03.03.2025 17:40
👍 0
🔁 0
💬 0
📌 0
🚨 New Blog Alert: “Locked Out, Dropboxed In: When BEC Threats Innovate” 🚨
Dive into an intriguing BEC attack and discover how this threat actor navigated a cloud environment to evade detection. We’ve also mapped the TTPs and shared IOCs on our GitHub.
👉 www.invictus-ir.com/news/locked-...
19.02.2025 14:52
👍 1
🔁 0
💬 1
📌 0