@iMHLv2 Profile picture

Michael Ligh (MHL)

@iMHLv2

CTO @Volexity. Malware Analyst's Cookbook. Art of Memory Forensics. The @Volatility Project. Thoughts are those of my employer, not mine, they made me say it.

Similar User
volatility photo

@volatility

Jamie Levy🦉 photo

@gleeda

Eric Zimmerman photo

@EricRZimmerman

Lenny Zeltser photo

@lennyzeltser

Bart photo

@bartblaze

Sarah Edwards 👩🏻‍💻🐈‍⬛ photo

@iamevltwin

Didier Stevens photo

@DidierStevens

Rob T. Lee photo

@robtlee

Andrew Case photo

@attrc

Chad Tilbury photo

@chadtilbury

Seongsu Park photo

@unpacker

Willi Ballenthin photo

@williballenthin

Brian Carrier photo

@carrier4n6

Xylitol photo

@Xylit0l

Kimberly photo

@StopMalvertisin

Michael Ligh (MHL) Reposted

Thank you!! This was a fun & wild case for us and happy you enjoyed the story.


Michael Ligh (MHL) Reposted

Today at @CYBERWARCON we watched arguably one of the most interesting talks we've seen in awhile. @stevenadair gave a nearly 1 hour presentation regarding APT28's "Nearest Neighbor Attack". In summary, because it was a long and wild story, APT28 successfully compromised one of…


Michael Ligh (MHL) Reposted

.@Volexity has published a blog post detailing variants of LIGHTSPY & DEEPDATA malware discovered in the summer of 2024, including exploitation of a vulnerability in FortiClient to extract credentials from memory. Read more here: volexity.com/blog/2024/11/1… #dfir #threatintel


“In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever worked.” volexity.com/blog/2024/11/2…


Michael Ligh (MHL) Reposted

.@Volexity’s latest blog post describes in detail how a Russian APT used a new attack technique, the “Nearest Neighbor Attack”, to leverage Wi-Fi networks in close proximity to the intended target, while the attacker was halfway around the world. volexity.com/blog/2024/11/2… #dfir


Michael Ligh (MHL) Reposted

@stevenadair and I presented on this last month at #FTSCon (IYKYK). Steven is also presenting today @CYBERWARCON Really excited to finally share this research publicly! It's probably one of the more crazy/interesting IR engagements we've ever worked! #DFIR #ThreatIntel

.@Volexity’s latest blog post describes in detail how a Russian APT used a new attack technique, the “Nearest Neighbor Attack”, to leverage Wi-Fi networks in close proximity to the intended target, while the attacker was halfway around the world. volexity.com/blog/2024/11/2… #dfir



Michael Ligh (MHL) Reposted

Check out the back of my new favorite @volexity shirt that I acquired at FTSCon last week! Using memory forensics to find 0days in network appliances and high value applications will never get old! #DFIR

Tweet Image 1

Michael Ligh (MHL) Reposted

Surge Collect Pro provides stable, secure memory and selective file acquisition across all major operating systems and cloud providers. It also supports PGP encrypted collections so only your DFIR team can access collected data. volexity.com/products-overv… #DFIR @Volexity


Michael Ligh (MHL) Reposted

The whitepaper with full technical details can be found here: volexity.com/wp-content/upl…

Our talk from @defcon is now available! In the presented research, we document every EDR bypass technique used in the wild along with how to detect it using new memory forensics techniques and @volatility plugins. Feedback appreciated! youtube.com/watch?v=PmqvBe… #DFIR



Michael Ligh (MHL) Reposted

Our talk from @defcon is now available! In the presented research, we document every EDR bypass technique used in the wild along with how to detect it using new memory forensics techniques and @volatility plugins. Feedback appreciated! youtube.com/watch?v=PmqvBe… #DFIR


Michael Ligh (MHL) Reposted

The first in-person Malware & Memory Forensics Training focused solely on #Volatility3 kicked off today! #dfir #memoryforensics

Tweet Image 1

For the first time, we are hosting an in-person, public offering of our Malware & Memory Forensics Training focused solely on #Volatility3! When & Where: October 22–25, 2024 Arlington, VA Read more in our latest blog post: volatilityfoundation.org/in-person-malw… #dfir #memoryforensics



Michael Ligh (MHL) Reposted

Listening to @hexlogic giving a talk on Heuristically Detecting Modern #macOS #malware at From the Source #FTSCon #FTSCon2024 @volatility /@Volexity

Tweet Image 1
Tweet Image 2
Tweet Image 3

Michael Ligh (MHL) Reposted

Speaking now in the #FTSCon MAKER Track: Harlan Carvey (@HuntressLabs) is presenting “Design and Use of RegRipper 4.0” #dfir


Michael Ligh (MHL) Reposted

Speaking now in the #FTSCon HUNTER Track: John Hammond (@HuntressLabs) is presenting “Malware ExtravaScamza” #dfir


Michael Ligh (MHL) Reposted

Speaking now in the #FTSCon HUNTER Track: Jimmy Wylie (@DragosInc) is presenting “TRISIS to FrostyGoop: Misconceptions, Realities, and Skills in ICS Malware Analysis” #dfir


Michael Ligh (MHL) Reposted

Now listening to @attrc giving a talk on Detecting and Defeating EDR Evading Malware with @volatility 3 #dfir #FTSCon #FTSCon2024 @Volexity

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

Michael Ligh (MHL) Reposted

Now listening to @keydet89 from @HuntressLabs give a talk about the design and usage of RegRipper 😀 @volatility / @Volexity #dfir #FTSCon FTSCon2024

Tweet Image 1
Tweet Image 2

Michael Ligh (MHL) Reposted

Speaking now in the #FTSCon HUNTER Track: Greg Lesnewich (@proofpoint) is presenting “Holding a GRUdge: Phishing Campaigns Outside the Warzone” #dfir


Michael Ligh (MHL) Reposted

Speaking now in the #FTSCon MAKER Track: Andrew Case (@Volexity) is presenting “Detecting & Defeating EDR-Evading Malware with Volatility 3” #dfir


Michael Ligh (MHL) Reposted

.@volatility New Release: #volatility3 v2.8.0 - visit github.com/volatilityfoun… for details and downloads. #memoryforensics #dfir

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.