0
Skip to Content
InfoSecculent
InfoSecculent
HOME
BLOG
TOOLS
InfoSecculent
InfoSecculent
HOME
BLOG
TOOLS
HOME
BLOG
TOOLS
Investigating QR Code Phishing Campaigns and Evasion Techniques
0x3ronic 2/21/24 0x3ronic 2/21/24

Investigating QR Code Phishing Campaigns and Evasion Techniques

QR codes have become a popular phishing method of choice for many reasons, which has made blocking and defending against this technique a little cumbersome for IT and Security administrators.

Read More
Malware Infection Via OneNote Attachments And How To Defend Against It
Malware Analysis 0x3ronic 1/26/23 Malware Analysis 0x3ronic 1/26/23

Malware Infection Via OneNote Attachments And How To Defend Against It

Threat actors are now deploying malicious OneNote files to gain initial access on a targets machine. This is done by attaching malicious .vbs (VBScript) files within the OneNote document along with an enticing call to action button.

Read More
Raspberry Robin USB Worm Malware Analysis
Malware Analysis 0x3ronic 10/22/22 Malware Analysis 0x3ronic 10/22/22

Raspberry Robin USB Worm Malware Analysis

In this post, I discuss my real-world encounter with the Raspberry Robin worm infection, and how it gained initial access from a malicious USB device. Below is a timeline of events observed on the endpoint from the moment the USB device was mounted to when execution events began.

Read More
Analysing SocGholish ‘Chrome Update’ Malware
Malware Analysis 0x3ronic 4/19/22 Malware Analysis 0x3ronic 4/19/22

Analysing SocGholish ‘Chrome Update’ Malware

I discuss my first real-world encounter with the SocGholish drive-by download malware, and then go on to analyse its impact, how it works and how our defenses managed to thwart the second stage of the attack.

Read More
Phishing: Fake Microsoft Login Page
Phishing 0x3ronic 2/3/22 Phishing 0x3ronic 2/3/22

Phishing: Fake Microsoft Login Page

An HTML file containing obfuscated Javascript was sent via a spear phishing email campaign lately. Although the phish isn’t the most sophisticated out there…

Read More
Zero Logon - TryHackMe Write-up
Write-up, TryHackMe 0x3ronic 1/8/22 Write-up, TryHackMe 0x3ronic 1/8/22

Zero Logon - TryHackMe Write-up

Zero Logon was a critical Active Directory vulnerability that allowed attackers to gain Domain Administrator privileges by exploiting the MS-NRPC (NetLogon Remote Protocol).

Read More

InfoSecculent

A Cyber Security blog from the perspective
of a SOC Analyst.