Threat Actor Spotlight
Velociraptor Turned Weapon: Attackers Deploy DFIR's Own Framework as a RAT
In a striking reversal, threat actors exploiting SolarWinds Web Help Desk vulnerabilities have been observed deploying Velociraptor—a legitimate open-source digital forensics and incident response framework—as a remote access and data collection tool. After gaining initial entry, operators pivot through Cloudflare tunnels and Zoho infrastructure to establish covert command channels, then weaponize Velociraptor's VQL query engine to harvest system artifacts, enumerate credentials, and exfiltrate data.
DFIR teams investigating these intrusions must hunt specifically for unauthorized MSI installs, VQL script activity, and Cloudflare tunnel artifacts—while moving fast. Attackers are actively erasing traces, making volatile evidence preservation the immediate priority upon detection.