The DFIR Report
thedfirreport.bsky.social
The DFIR Report
@thedfirreport.bsky.social
Real Intrusions by Real Attackers, the Truth Behind the Intrusion.

https://thedfirreport.com
...discovered share. These actions generated Windows Security Event ID 5145 object access entries referencing the delete[.]me file."

Want a heads-up when we drop a new report? Sign up here: thedfirreport.com/subscribe/
November 15, 2025 at 6:01 PM
...legitimate accounts already present in the environment. For the rest of the report we will refer to these accounts as: "administratr", "Lookalike 1", and "Lookalike 2"."

Want a heads-up when we drop a new report? Sign up here: thedfirreport.com/subscribe/

2/2
November 14, 2025 at 5:27 PM
...beachhead host without performing any credential access activities, indicating these credentials were also obtained prior to initial access."

Want a heads-up when we drop a new report? Sign up here: thedfirreport.com/subscribe/

3/3
Subscribe
If you would like to receive an email when we publish a new report, please type your email address below and press subscribe. If you do not receive the confirmation email within a few minutes, plea…
thedfirreport.com
November 13, 2025 at 3:55 PM
...there was no indication of brute force or password spraying occurring, indicating these credentials were obtained prior to the intrusion.

The threat actor was also observed using credentials for a second account with domain administrator privileges to pivot from the...

2/3
November 13, 2025 at 3:55 PM
➡️ The above is from a recent Private Threat Brief: "Signed Malware, PowerShell Abuse, and Azure Exfiltration in Fake WinSCP Intrusion"
➡️➡️Interested in receiving reports like this one? Contact us for a demo or pricing - thedfirreport.com/contact/
October 20, 2025 at 12:14 AM
"...It's unclear why they scanned these external IPs. An interesting observation is that they scanned public IP ranges which hosted the C2 addresses used by Supper:"
October 20, 2025 at 12:14 AM
➡️ The above is from a recent Private Threat Brief: "Signed Malware, PowerShell Abuse, and Azure Exfiltration in Fake WinSCP Intrusion"
➡️➡️Interested in receiving reports like this one? Contact us for a demo or pricing - thedfirreport.com/contact/
October 16, 2025 at 1:29 PM
The full lab from the challenge is now live, with all quiz-style questions included.
➡️ Try it via one-time access -> dfirlabs.thedfirreport.com/store
or subscription - > dfirlabs.thedfirreport.com/subscription...

And we just dropped the full report too:
📄 thedfirreport.com/2025/09/29/f...
DFIR Labs Portal
Browse and purchase DFIR Labs to enhance your cybersecurity skills.
dfirlabs.thedfirreport.com
September 29, 2025 at 11:37 PM
thedfirreport.com
September 29, 2025 at 2:49 PM
September 23, 2025 at 11:19 PM
September 22, 2025 at 10:10 PM
September 21, 2025 at 1:05 PM
September 20, 2025 at 8:54 PM
September 19, 2025 at 11:58 PM