Front Page

Insider Threat

The Trusted Responder: US Prosecutors Allege IR Consultant Aided BlackCat Ransomware Actors

US prosecutors have alleged that a licensed incident response consultant deliberately assisted BlackCat/ALPHV ransomware operators during live engagements — exploiting privileged network access to facilitate attacker persistence and hamper victim recovery. It is one of the most disturbing insider threat cases in DFIR history.

The implications are industry-wide. Vendor vetting, privileged access governance, and independent remediation verification are now evidentiary necessities. Forensic examiners should document every action taken under external consultant credentials and treat all third-party IR access as a potential privileged-access risk.

Living-Off-the-Land Attack

Stryker Breach: Attackers Abuse Microsoft Intune to Disrupt Medical Device Supply Chain

Attackers disrupted manufacturing at Stryker, one of the world's largest medical device manufacturers, by abusing Microsoft Intune and native management tools rather than deploying malware — evading every malware-centric control in the environment. A textbook living-off-the-land execution with no malicious binaries on disk.

Investigators must reconstruct attacker actions entirely from Intune audit logs, Azure AD sign-in records, and device compliance policy change histories. The Stryker case confirms that management-plane forensics is now a core IR competency, and tools like DeepBlueCLI are increasingly essential for hunting these artifact chains.

Threat Bulletin

ACTIVE EXPLOIT
CVE-2026-3910

Chromium V8 Engine — Type Confusion RCE via malicious web content. Added to CISA KEV March 13; emergency Chrome 146 patch released. Forensic Note: Preserve browser profiles and V8 crash telemetry; exploitation leaves renderer process anomalies in crash logs.

CRITICAL
CVE-2026-26110

Microsoft Office RCE via Preview Pane — code executes without opening the file; previewing in Explorer is sufficient. One of two zero-days in March Patch Tuesday's 84-fix release. Forensic Note: Check Outlook preview events in Windows telemetry alongside the standard file-open artifact chain.

Malware Spotlight

Avrecon Botnet (SocksEscort)

US and European authorities dismantled the SocksEscort proxy-for-hire network — 360,000 compromised routers recruited since 2020 to launder ransomware C2 traffic. Forensic Note: Minimal on-device artifacts; hunt via outbound connection anomalies and firmware integrity checks.