Collecting Favicon data

Favicons are the little icon that appears on the tab of your web browser when visiting most websites. They’re small image files, usually .png with the extension ‘.ico’. While generally …

Ransomware over time

I used data from the (now defunct) malware wiki and cyber.nj.gov to create this timeline, which I keep up to date when possible. The timeline is generated using timeline.knightlab.com. The …

Analyzing Phishing Emails

When looking at phishing emails, I am interested primarily in: To get to those, you have to open the email. This can be done by literally opening it and manually …

Putting data on a map

When threat hunting, putting information on a map can be useful at times. In most cases, maps are used as eye candy, but provide little valuable information. However, there are …

Hunting for Emotet with URLHaus

Emotet started out as a banking trojan around 2014, but has evolved to (primarily) deliver ransomware via malicious emails (malspam). Infections occur either via malicious scripts in web pages or …

URL Decoding

Some security products that detect phishing URLs in an email modify the URL so it’s not easy to click on. One example of a product that does this is the …