ArchinalLee Profile Banner
Lee Archinal Profile
Lee Archinal

@ArchinalLee

Followers
606
Following
6K
Media
105
Statuses
3K

Log junkie trying to share what I know through training and posts. Privileged to be a #BlackHatUSA trainer!

Some SIEM/EDR/XDR
Joined June 2019
Don't wanna be here? Send us removal request.
@Pirates
Pittsburgh Pirates
3 months
Happy Skenes Day! REPOST THIS for a chance to win this autographed baseball by Paul Skenes. Presented by @sheetz
143
7K
3K
@r3nzsec
Renzon
4 months
Super fun working on this lab with the @XintraOrg gang!! Enjoy and let us know your feedback! #ScatteredSpider #MuddledLibra #UNC3944
@inversecos
inversecos
4 months
NEW LAB: Scattered Spider (UNC3944) 🕷️🕸️ Scattered Spider hits indie studio AB Projekt Blue, deploying ransomware and stealing unreleased game code. Test your skills on: 👀 Social Engineering & MFA Fatigue 👀 Credential Theft via OST Files 👀 Bring Your Own Vulnerable Driver
2
4
41
@Pirates
Pittsburgh Pirates
4 months
REPOST THIS for a chance to win a @NewEraCap Players' Weekend 59FIFTY Cap!
49
2K
1K
@Intel471Inc
Intel 471
5 months
How do #malware behaviors inform hunt strategy? Find out July 31 in Intel 471’s live, hands-on workshop. Real telemetry, real IOAs, guided by our #threatintel and #threathunting teams. Sign up: https://t.co/xPDKlbYsRQ #cybersecurity #CTI
0
2
5
@780thC
780th Military Intelligence Brigade (Cyber)
5 months
Intel 471: This post will examine one of the top pro-Russian hacktivist groups, new ones that have entered the scene and the impact of these groups. https://t.co/xjqeRWKfY5 @Intel471Inc
2
25
41
@Analyst1
Analyst1
6 months
🚨 New Threat Actor Profile by @intel_anastasia From the shadows of Conti, Black Basta emerged as one of the most prolific ransomware gangs in recent years—until a massive internal leak exposed everything. 🔍 In our latest profile, we trace the group’s Conti lineage, breakdown
0
13
30
@TheDFIRReport
The DFIR Report
6 months
🌟New report out today!🌟 Hide Your RDP: Password Spray Leads to RansomHub Deployment Analysis and reporting completed by @tas_kmanager@iiamaleks and UC2 🔊Audio: Available on Spotify, Apple, YouTube and more! https://t.co/jL4oy28kS0
Tweet card summary image
thedfirreport.com
Key Takeaways Initial access was via a password spray attack against an exposed RDP server, targeting numerous accounts over a four-hour period. Mimikatz and Nirsoft were used to harvest credential…
1
38
113
@ArchinalLee
Lee Archinal
6 months
Check out this opportunity to work with an awesome team! #ThreatHunting #ThreatIntel
@TheDFIRReport
The DFIR Report
6 months
🔎 We're Hiring: Senior Security Analyst We're looking for a full-time Senior Security Analyst with a passion for dissecting intrusions and translating technical findings into actionable insights. Check out the full job description and apply here 👉
0
1
2
@Intel471Inc
Intel 471
6 months
CTI teams are under pressure to mature fast. In this #SANS webcast, Intel 471’s Ashley Jess shares insights on integrating #geopolitics and measuring CTI value using frameworks like CTI-CMM & CU-GIRH. Watch the full discussion: https://t.co/q1F8RuJEOH #CTI #cybersecurity
Tweet card summary image
intel471.com
The SANS Institute has released its SANS 2025 CTI Survey report, an influential pulse-check of cyber threat intelligence (CTI) trends, challenges, and use cases. On May 21, 2025, Ashley Jess, a...
0
6
27
@NicoleBeckwith
Nicole Beckwith
6 months
🚨Kroger cybersecurity is hiring! Check out the postings here: https://t.co/RWaq7jZgzZ #cyberjobs #hiring
9
34
91
@Intel471Inc
Intel 471
7 months
Join Intel 471's Level 2 Threat Hunting Workshop on Execution tomorrow, May 14 from 12 - 1 PM EDT. Investigate PowerShell abuse, LOLBins, macro payloads, and more using real-world data. Finish the challenge, earn your #threathunting badge. Register now: https://t.co/z5dsi27bvk
0
1
5
@TheDFIRReport
The DFIR Report
8 months
📉DFIR Labs Weekend Discount📉 Use this discount code to receive 10% off all DFIR Labs cases! Discount expires May 5th 04:00 UTC ⏲️Buy now, use anytime over the next 3 months. ➡️Discount code: WeekendDiscount20250502 Access DFIR Labs:
Tweet card summary image
store.thedfirreport.com
Explore Real-World Cybersecurity Intrusions with Our Interactive DFIR Labs Our cloud-based DFIR (Digital Forensics and Incident Response) Labs offer a hands-on learning experience, using real data...
0
12
37
@TheDFIRReport
The DFIR Report
8 months
🌟New report out today!🌟 Navigating Through The Fog Analysis and reporting completed by @angelo_violetti, and reviewed by @svch0st. Audio: Available on Spotify, Apple, YouTube and more! https://t.co/aN5xFoYATD
Tweet card summary image
thedfirreport.com
Key Takeaways An open directory associated with a ransomware affiliate, likely linked to the Fog ransomware group, was discovered in December 2024. It contained tools and scripts for reconnaissance…
0
34
76
@jamieantisocial
J⩜⃝mie Williams
8 months
this continues to be the most simple yet diabolical defense evasion.
@MsftSecIntel
Microsoft Threat Intelligence
8 months
Microsoft Defender Experts (DEX) has observed and helped multiple customers address campaigns leveraging Node.js to deliver malware and other payloads that ultimately lead to information theft and data exfiltration.
12
80
555
@TheDFIRReport
The DFIR Report
8 months
“For this case we observed TXT records being utilized for C2 communication rather than MX records. This can be identified by the "type: 16" in the Sysmon logs seen above. Below is a sample list that, while not exhaustive, provides a clear example of the traffic patterns:” 1/2
2
28
134
@CyberProPodcast
The Cyber Pro Podcast
8 months
#Cybersecurity truly is a collaborative endeavor. We asked Steve Orrin from @intel to share his insights on how the government and commercial sides can work together to stay ahead of #CYBER threats. #informationsecurity
0
1
1
@Intel471Inc
Intel 471
9 months
🚨 VanHelsing Ransomware hit 3 victims within weeks of launch. Cross-platform, $500K ransoms, and growing fast. Intel 471 is tracking it, read the full report: https://t.co/ejkEhQkrIt #vanhelsing #ransomware #emergingthreats #threathunting #cybersecurity
0
3
4
@Intel471Inc
Intel 471
9 months
LockBit 4.0 enhances its stealth with PowerShell abuse, security feature bypasses, and obfuscated exfiltration. Intel 471 tracks its evolving tactics, read the full report here: https://t.co/GBiTWciNxn #emergingthreat #lockbit #threathunting #threatintel
0
6
14
@Intel471Inc
Intel 471
9 months
Threat hunting is about focus. Knowing where to spend your time is what sets tactical hunters apart. Join Out of the Woods live tomorrow for an interactive discussion on what drives real results. Our hosts will be engaging in real time on Discord. 🔗 https://t.co/y6JvJqWule
0
2
3