<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Dfir on Matt Suiche</title><link>https://www.msuiche.com/categories/dfir/</link><description>Recent content in Dfir on Matt Suiche</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 25 Dec 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://www.msuiche.com/categories/dfir/index.xml" rel="self" type="application/rss+xml"/><item><title>SUNBURST &amp; Memory Analysis</title><link>https://www.msuiche.com/posts/sunburst-memory-analysis/</link><pubDate>Fri, 25 Dec 2020 00:00:00 +0000</pubDate><guid>https://www.msuiche.com/posts/sunburst-memory-analysis/</guid><description>&lt;p&gt;The recent SolarWind&amp;rsquo;s hack which resulted in a backdoor version of their SolarWind Orion product which counts 33,000 customers has been all over the news in the past few weeks - most things have been said and repeated, although there are few notes that I mentioned on Twitter which I would like to compile in a blogpost for perenniality.&lt;/p&gt;
&lt;p&gt;First of all, I would like to point out to the presence in the backdoor process blacklist (&lt;em&gt;the full list can be found on &lt;a href="https://github.com/ITAYC0HEN/SUNBURST-Cracked" target="_blank" rel="noopener"&gt;Itay Cohen&amp;rsquo;s repository&lt;/a&gt;&lt;/em&gt;) of several processes that can be used for either:&lt;/p&gt;</description></item></channel></rss>