0
Skip to Content
InfoSecculent
InfoSecculent
HOME
BLOG
TOOLS
InfoSecculent
InfoSecculent
HOME
BLOG
TOOLS
HOME
BLOG
TOOLS
Malware Infection Via OneNote Attachments And How To Defend Against It
Malware Analysis 0x3ronic 1/26/23 Malware Analysis 0x3ronic 1/26/23

Malware Infection Via OneNote Attachments And How To Defend Against It

Threat actors are now deploying malicious OneNote files to gain initial access on a targets machine. This is done by attaching malicious .vbs (VBScript) files within the OneNote document along with an enticing call to action button.

Read More
Raspberry Robin USB Worm Malware Analysis
Malware Analysis 0x3ronic 10/22/22 Malware Analysis 0x3ronic 10/22/22

Raspberry Robin USB Worm Malware Analysis

In this post, I discuss my real-world encounter with the Raspberry Robin worm infection, and how it gained initial access from a malicious USB device. Below is a timeline of events observed on the endpoint from the moment the USB device was mounted to when execution events began.

Read More
Analysing SocGholish ‘Chrome Update’ Malware
Malware Analysis 0x3ronic 4/19/22 Malware Analysis 0x3ronic 4/19/22

Analysing SocGholish ‘Chrome Update’ Malware

I discuss my first real-world encounter with the SocGholish drive-by download malware, and then go on to analyse its impact, how it works and how our defenses managed to thwart the second stage of the attack.

Read More

InfoSecculent

A Cyber Security blog from the perspective
of a SOC Analyst.