β¨DFRWS EU 2026 Workshops
π Workshop Dates 23β24 March 2026
π Hybrid β’ LinkΓΆping, Sweden
Explore workshop details π https://buff.ly/Q45nyji
Register π https://buff.ly/lsQrqiZ
β¨DFRWS EU 2026 Workshops
All DFRWS #Workshops and Social Events are inclusive in Registration. π
π Workshop Dates 23β24 March 2026
π Hybrid β’ LinkΓΆping, Sweden
Explore workshop details π buff.ly/Q45nyji
Register π buff.ly/lsQrqiZ
#NetworkTrafficAnalysis #MemoryForensics #DFIR #TorAnalysis
05.03.2026 08:30
π 3
π 1
π¬ 0
π 0
π A major phishing-as-a-service platform disrupted.
Tycoon2FA enabled large-scale account compromise by bypassing MFA protections.
Through Europolβs Cyber Intelligence Extension Programme, industry intelligence was turned into operational results.
Read more here: https://ow.ly/GECE50YoZIO
04.03.2026 16:02
π 8
π 4
π¬ 0
π 0
I'm interested in getting in touch with anyone who was involved in the WANK/OILZ worm outbreak at NASA/CERN/DoE in 1989.
I've talked to a few folks, but there are still blanks in this story - if you were part of that please ping me.
01.03.2026 10:03
π 6
π 8
π¬ 0
π 0
GRU unit 26165 domains:
accesscan[.]org glize[.]com
Youβve verified them, right?
Youβve verified them, right?
21 of the world's best intelligence and security agencies cannot be wrong... right?
netresec.com?b=26233f4
27.02.2026 16:34
π 2
π 1
π¬ 1
π 0
β¨ DFRWS EU 2026 Workshops
Hands-on Analysis of Network Packets Carved from Memory & PCAP Analysis of Unencrypted Tor Traffic
Led by Erik Hjelmvik (Netresec, Sweden), the session is designed for practitioners and researchers working with network and memory forensics in real-world investigations.
π Workshop Dates 23β24 March 2026
Details here: π https://buff.ly/oT8OtbE
β¨ DFRWS EU 2026 Workshops
Led by Erik Hjelmvik (Netresec, Sweden), the session is designed for practitioners and researchers working with network and memory forensics in real-world investigations.
π Workshop Dates 23β24 March 2026
π Details here: π buff.ly/oT8OtbE
06.02.2026 08:30
π 1
π 1
π¬ 0
π 0
Erik Hjelmvik will run a hands-on network forensic workshop at the upcoming Digital Forensics Research Conference in Sweden. Participants will get the chance to analyze:
πͺ Packets carved from memory dumps
π§
Unencrypted Tor traffic
dfrws.org/dfrws-eu-202...
05.02.2026 10:10
π 2
π 1
π¬ 0
π 0
NetworkMiner has been around for a long time, and it shows β in a good way.
It feels opinionated. It feels calm. It feels like a tool made by people whoβve already had a few bad days in incident response.
No hype. No buzzwords. Just packets telling you what happened.
Thank you for those kind words! π
www.linkedin.com/pulse/issue-...
27.01.2026 08:28
π 2
π 2
π¬ 0
π 0
Online Network Forensics Class
I will teach a live online network forensics training on February 23-26. The full title of the class is Network Forensics for Incident Response, where we will analyze PCAP files containing network tra...
The early bird discount, for our live online network forensics class, expires by the end of this week. Sign up if youβd like to analyze PCAP files together with Erik Hjelmvik (creator of NetworkMiner and PolarProxy).
netresec.com?b=25A2e4f
26.01.2026 07:06
π 0
π 1
π¬ 0
π 0
DFRWS EU 2026 is seeking posters showcasing interesting digital forensics research for presentation in LinkΓΆping, Sweden, 24β27th March 2026. π₯ Submit via EasyChair (PDF) - Rolling notification until the program is full! #DFRWSEU2026 #DFRWS #DigitalForensics
21.01.2026 08:54
π 0
π 1
π¬ 0
π 0
Big thank you to @thedfirreport.bsky.social for capturing this intrusion traffic! π
10.12.2025 17:00
π 1
π 0
π¬ 0
π 0
Keylog extracted from BackConnect VNC network traffic by NetworkMiner
Keylog of attacker's hands-on keyboard actions from BackConnect VNC session
10.12.2025 17:00
π 0
π 1
π¬ 1
π 0
Attacker fails to inspect ad_users.txt
Here's one of the screenshots from the BackConnect VNC sessions in the blog post
10.12.2025 17:00
π 0
π 0
π¬ 1
π 0
CN #APT targeting attendees of a diabetes conference in Singapore in December
attd.z23.web.core[.]windows[.]net/ATTD-ASIA-2025.zip (live link, careful!)
ATTD-ASIA-2025.lnk a12357ff6c0f7b021f32b0c9cd3d01c4
ATTD-ASIA-2025.zip a8082a80cef9ccee9d7a35f5366e3afb
gzv.msi 32e7dcbd26b6455974d5b2c52c3ca421 π΄
20.11.2025 20:10
π 3
π 1
π¬ 2
π 0
C2 runs on:
π₯ portabalbufe[.]com
π₯ 172.67.212.147:443
Other C2 indicators:
π₯ JA3 a0e9f5d64349fb13191bc781f81f42e1
π₯ JA4 t12d190800_d83cc789557e_7af1ed941c26
π₯ Cert hash 25aa00e75ca12bc66ff475ebe9c6bfbd466e91ed
20.11.2025 20:42
π 3
π 0
π¬ 0
π 0
That's great! Long lived IOCs like that are golden.
10.11.2025 09:56
π 0
π 0
π¬ 0
π 0
The boring answer is of course "it depends". But most incident responders would probably agree that a C2 IP address can be considered "old" when a couple of weeks have passed since it was last seen active.
06.11.2025 15:59
π 0
π 0
π¬ 1
π 0
π½π΄πππ΄ππ΄π² (@netresec@infosec.exchange)
Here's a copy-paste friendly version of our ASCII Pyramid of Pain
License: CC0
```
,/\
,Β΄V_-\ IOC Pyramid
,Β΄\/-__-\ of Pain
,Β΄\\/-_--_-\
,Β΄\\\V_--TTP-_...
Agreed, real-world IOC decay/score varies depending on TA choices as well as the actions we take as defenders.
Fantastic that you like our ASCII Pyramid of Pain π
Here's a CC0 licensed copy-paste friendly version:
infosec.exchange/@netresec/11...
06.11.2025 15:41
π 0
π 0
π¬ 0
π 0
I love the idea of calculating the decay rate of an IOC. It's not always strictly mathematical, because it also relies on threat actors' choices about how they use the IOCs, but as an estimate and for decision making, this seems promising.
Also, I really like @netresec.com's ASCII art Pyramid. π
06.11.2025 13:23
π 6
π 1
π¬ 2
π 0
Optimizing IOC Retention Time
Are you importing indicators of compromise (IOC) in the form of domain names and IP addresses into your SIEM, NDR or IDS? If so, have you considered for how long you should keep looking for those IOCs...
Monitoring for too many old indicators not only costs money, it can even inhibit detection of real intrusions.
π Include "last seen" date when publishing IOCs
β Prune old IOCs
π Prioritize long lived IOCs over short lived ones
netresec.com?b=25Be9dd
06.11.2025 13:08
π 3
π 1
π¬ 1
π 1
π¨ The #DFRWSEU 2026 paper submission deadline has been extended to 10th October 2025 π
Submit your paper showcasing cutting-edge digital forensics research.
π€ Submit here: buff.ly/BN8Jlnb
βΉοΈ Conference details: buff.ly/KOw9Xpr
#DFRWS #DigitalForensics #CFP
24.09.2025 15:15
π 3
π 1
π¬ 0
π 0
Define Protocol from Traffic (XenoRAT)
This video shows how to define a protocol in CapLoader just by providing examples of what the protocol looks like. CapLoader can then identify that protocol in other traffic, regardless of IP address ...
Video: Detecting #XenoRAT C2 connections using example traffic from known malware sample.
π₯ e0b465d3bd1ec5e95aee016951d55640
π₯ 5ab23ac79ede02166d6f5013d89738f9
π‘ Huy1612-24727.portmap[.]io:24727
π‘ 193.161.193.99:24727
π‘ 147.185.221.30:54661
netresec.com?b=258f641
21.08.2025 13:22
π 1
π 1
π¬ 0
π 0