Aug. 28, 2023, 3:18 p.m. | /u/TheDFIRReport

Computer Forensics www.reddit.com

In this case a threat actor delivered a password protected ZIP file via HTML smuggling. Within the password protected ZIP file, there was an ISO file that deployed IcedID which led to the use of Cobalt Strike. Nokoyawa ransomware was deployed domain wide within 12 hours of initial access.

Report: [https://thedfirreport.com/2023/08/28/html-smuggling-leads-to-domain-wide-ransomware/](https://thedfirreport.com/2023/08/28/html-smuggling-leads-to-domain-wide-ransomware/)

access actor case cobalt cobalt strike computerforensics domain file html html smuggling icedid initial access iso led nokoyawa nokoyawa ransomware password ransomware smuggling strike threat threat actor zip

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC