Josh Lemon's Avatar

Josh Lemon

@joshlemon

Chief of DIFR at SoteriaSec | SANS Institute Principal Instructor | Digital Forensics & Incident Response geek.

54
Followers
150
Following
34
Posts
25.11.2024
Joined
Posts Following

Latest posts by Josh Lemon @joshlemon

It also uses SQL-based queries to perform analysis, similar to #OSquery.

blog.trailofbits.com/2026/02/25/m...

01.03.2026 06:41 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Memory Analysis for #Linux has always been a bit hit-or-miss. Trail of Bits has released a tool called #mquire that doesn't require debug symbols for the originating Kernel.

#MemoryForensics #IncidentResponse #DFIR #DigitalForensics

01.03.2026 06:41 πŸ‘ 2 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Preview
Ex-L3Harris exec jailed for selling zero-days to Russian exploit broker The former head of Trenchant, a specialized U.S. defense contractor unit, was sentenced Tuesday to more than seven years in federal prison for stealing and selling zero-day exploits to a Russian broke...

How would your organisation fare in detecting IP theft via a hard drive connected to a sensitive system?

"Williams used a portable external hard drive to transfer the exploits out of secure networks at Trenchant's offices in Sydney and Washington, D.C."

www.bleepingcomputer.com/news/securit...

26.02.2026 00:56 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

The move to IAKerb and local KDC for local and cached authentication will be....interesting.

Falling back to NTLM for authentication using IP addresses instead of FQDNs, I suspect, will keep NTLM in most environments, but overall this is a hopeful step in the right direction.

03.02.2026 04:20 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Microsoft is moving to disable NTLM by default, with some exceptions.

If implemented, this will have a significant impact on threat actors abusing credentials within a network.

#SecOps #IncidentResponse #ThreatDetection #SOC

πŸ”— techcommunity.microsoft.com/blog/windows...

03.02.2026 04:20 πŸ‘ 4 πŸ” 1 πŸ’¬ 1 πŸ“Œ 1

This year I’ve pulled together a comparison from last year's data and tried to break down some of the results by organisation size.

15.12.2025 23:19 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Got some time at the end of the year? We’ve just published the SANS Institute Detection and Response Survey results.

Free Download (requires login only)
πŸ”— go.sans.org/detection-re...

#DnR #ThreatDetection #IncidentResponse #CSIRT #SOC #CERT #Cybersecurity

15.12.2025 23:19 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

I'm not sure how accurate this is, but The Verge is reporting that #SysMon will be integrated into Windows 11 early next year.

This will be a massive win for #DFIR and #SecOps people everywhere if it's correct.

www.theverge.com/news/821948/...

18.11.2025 16:40 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

I'm not sure this will have a significant impact on what Threat Actors do with WMI, however, it'll at least force a Threat Actor to use PowerShell where there is better built-in visibility (if it's enabled), compared to WMIC.

18.09.2025 01:37 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Wow, Microsoft is removing #WMIC from Windows!
But they aren't removing the underlying WMI framework, so threat actors will have to use PowerShell to access WMI.

πŸ”— techcommunity.microsoft.com/blog/windows...

#IncidentResponse #ThreatDetection #ThreatIntel #CSIRT #CERT

18.09.2025 01:37 πŸ‘ 2 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

That's a bit nasty - a threat actor uses #Velociraptor as their primary C2 implant on the victim's system.

You think they might also let the victim use it for responding to the compromise as well? πŸ˜‚

news.sophos.com/en-us/2025/0...

#DFIR #IncidentResponse #ThreatDetection #ThreatIntel

28.08.2025 06:16 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

🚨 Alert on new credentials added to SPs.
πŸ”₯ Monitor changes to federated domains (federationConfiguration).
πŸ•΅πŸΌβ€β™‚οΈ Hunt unusual Graph API calls to /domains, /credentials, and /federationConfiguration.

#DFIR #ThreatHunting #EntraID #CloudForensics #M365 #ThreatDetection

19.07.2025 04:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

"Iβ€―SPy" Entraβ€―ID Global Admin Escalation Technique

Datadog's Security Labs identified an abuse of Office 365 Exchange Online service principal (SP) allowing escalation to Global Admin. MSRC considers it "expected misconfiguration" so don't expect a fix.

πŸ”— securitylabs.datadoghq.com/articles/i-s...

19.07.2025 04:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Here are some recent TTPs for Scattered Spider as well.
www.crowdstrike.com/en-us/blog/c...

09.07.2025 06:14 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

#ScatteredSpider are particularly good at #SocialEngineering their way via a third-party to other victims.

For clarity, #ScatteredSpider are considered the initial access group, #DragonForce #ransomware is the malware deployed once #ScatteredSpider are inside your network.

09.07.2025 06:07 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
M&S confirms social engineering led to massive ransomware attack M&S confirmed today that the retail outlet's network was initially breached in a "sophisticated impersonation attack" that ultimately led to a DragonForce ransomware attack.

This is a timely reminder to ensure any third-parties with access to your systems follow the same cyber policies you'd expect your internal staff to follow.

www.bleepingcomputer.com/news/securit...

#IncidentReponse #DataBreach #CSIRT

09.07.2025 06:07 πŸ‘ 0 πŸ” 0 πŸ’¬ 2 πŸ“Œ 0

πŸ’‘ On a side note, this is a great write up on #container #DFIR analysis if you're interested.

28.04.2025 10:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

πŸ•΅πŸΌβ€β™‚οΈ This malicious #container uses TENEO heartbeats to effectively earn credits. TENEO's ledger isn't exactly public so tracking the tokens isn't simple, there also doesn't appear to be a way to cash out...yet.

28.04.2025 10:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

This is an interesting write up on a slightly different #Docker #container #malware attack from the Cado Security and Darktrace teams.

πŸ”— www.darktrace.com/blog/obfusca...

28.04.2025 10:46 πŸ‘ 1 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Preview
NSW man charged over β€˜serious data breach’ that exposed thousands of sensitive court documents More than 9,000 files downloaded from NSW JusticeLink system but authorities say no personal data compromised

Here's an update on the data breach of court documents from the NSW JusticeLink website.

tl;dr - it was an individual that was able to download +9k documents over two months, it doesn't appear they were leaked anywhere publicly.

www.theguardian.com/australia-ne...

23.04.2025 13:59 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

πŸ•΅πŸΌβ€β™‚οΈ Detect .LNK files making external connections, they are particularly easy to tune.

πŸ•΅πŸΌβ€β™‚οΈ Detect mshta.exe running suspicious executables (i.e. cmd.exe).

Happy #ThreatHunting

πŸ”— blog.sekoia.io/detecting-mu...

23.04.2025 12:50 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

This is a really nice write up from Sekoia with lots of #ThreatDetection details, regardless of the #EDR you're using.

πŸ”Ž Of particular note, this attack is aided with a .LNK file pulling in a .HTA via a remote location.

23.04.2025 12:50 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
signature-base/yara/vuln_erlang_otp_ssh_cve_2025_32433.yar at master Β· Neo23x0/signature-base YARA signature and IOC database for my scanners and tools - Neo23x0/signature-base

- Make sure you go #ThreatHunting for compromised systems, prioritise public facing systems.

πŸ•΅πŸΌβ€β™‚οΈ YARA signature: github.com/Neo23x0/sign...

ℹ️ Public disclosure: www.openwall.com/lists/oss-se...

βš™οΈ PoC Demo: x.com/Horizon3Atta...

19.04.2025 05:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

🚨 New Critical RCE in Erlang/0TP SSH (CVSS 10)

- CVE-2025-32433
- Exploitable without authentication needed
- Exists in Erlang's built-in SSH server
- Commonly found in loT and Teleco gear
- Exploit model now in Metasploit and on GitHub

19.04.2025 05:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Google's Threat Intelligence Group published details last month of Russian #APTS targeting #Signal

➑️ Maliciously getting victims to scan QR codes
➑️ Maliciously cloning incoming messages with a Linked Device
➑️ Stealing the message database off a device

25.03.2025 23:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

With all the talk about the use of #Signal by government officials in the US, it's worth remembering #ThreatActors will target what they need to steal the data they want.

πŸ”— cloud.google.com/blog/topics/...

25.03.2025 23:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Microsoft recommended driver block rules View a list of recommended block rules to block vulnerable third-party drivers discovered by Microsoft and the security research community.

Vuln Driver Blocklist: learn.microsoft.com/en-us/window...

02.03.2025 21:54 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks Microsoft had discovered five Paragon Partition Manager BioNTdrv.sys driver flaws, with one used by ransomware gangs inΒ zero-dayΒ attacks to gain SYSTEM privileges in Windows.

Win 11 now has a Vulnerable Driver Blocklist feature, however, it's only updated in major updates so you still need to monitor for recently discovered Vulnerable Drivers.

Recent Vuln Driver: www.bleepingcomputer.com/news/securit...

Known Vuln Drivers: www.loldrivers.io

02.03.2025 21:54 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Image

Image

#BYOVD attacks are slowly becoming more common for threat actors to escalate privilege and kill security tools.
Make sure you're #ThreatHunting for new Vulnerable Drivers!

#IncidentResponse #ransomware #ThreatDetection

02.03.2025 21:54 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

Join me for SANS Institute #Perth Community Night today!

πŸ“‹ Registration
Thurs, 13 Feb 2025
5:30pm – 6pm

🎀 Presentation
6pm – 7pm

Register Here: https://www.sans.org/mlp/community-night-perth-february-2025/

πŸ“The Pan Pacific Perth Hotel, 207 Adelaide Terrace, Perth WA 6000

12.02.2025 23:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0