Infostealer Malware: What is it and how to investigate
What are Infostealer Malware? Infostealers are a type of malware specifically designed to locate and exfiltrate credentials. Their prevalence and impact were limited pre-COVID-19 as most of the...
View ArticleAll the Action from Magnet User Summit 2023
We couldn’t wait to head back to Music City (Nashville, Tennessee) to catch up with friends old and new and talk about all things Magnet Forensics and DFIR for Magnet User Summit 2023! We had a...
View ArticleHunting Russian Intelligence “Snake” Malware in Memory With Magnet AXIOM Cyber
This memory analysis post is authored by Matt Suiche (Director, Memory, IR & R&D). This week, a joint cybersecurity advisory was issued by the cybersecurity authorities (AA22-110A) of the...
View ArticleCSAM: Arming Investigators With Tools and Tips to Combat Child Sexual Abuse...
Since Magnet Forensics’ inception, we’ve been dedicated to our mission statement: Seek Justice and Protect the Innocent. Combatting Child Sexual Abuse Material (CSAM) is a big part of that. The ethos...
View ArticleAutomating Cloud Acquisitions With Magnet AUTOMATE Enterprise
We’re excited to announce that automated cloud acquisitions are available in Magnet AUTOMATE Enterprise automated workflows! AUTOMATE Enterprise always supported the processing of cloud images that...
View ArticleMagnet AXIOM Cyber 7.1 Is Now Available
We are happy to announce the release of Magnet AXIOM Cyber 7.1. In this release, we have added new features and improvements to help you work as efficiently as possible, including: Ability to Search...
View ArticleMagnet AXIOM 7.1 is Now Available!
A critical component of digital forensic examinations is the need to collaborate and discuss the findings from the case data with other stakeholders. This can include attorneys, other investigators,...
View ArticleInfostealer Malware: What is it and how to investigate
What are Infostealer Malware? Infostealers are a type of malware specifically designed to locate and exfiltrate credentials. Their prevalence and impact were limited pre-COVID-19 as most of the...
View ArticleBest Practices for Ransomware and Data Extortion Memory Response
This is a post authored by Matt Suiche (Director, Memory, IR & R&D), and Ivan King (Security Research Engineer). The Cybersecurity and Infrastructure Security Agency (CISA) & partners...
View ArticleHunting “Volt Typhoon” State-Sponsored Actor in Memory With Magnet AXIOM Cyber
This is a post authored by Matt Suiche (Director, Memory, IR & R&D). The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory...
View ArticleA Guide to Peak Hardware Performance for Magnet AXIOM
This post is authored by Christopher Cone, a Forensic Consultant at Magnet with 20 years of law enforcement experience. Recently, I have seen user questions about hardware choices as it relates to...
View ArticleMagnet AXIOM Cyber 7.2 Is Now Available
We are happy to announce the release of Magnet AXIOM Cyber 7.2. In this release, we have added support for SHA256 hash calculations, an improved the viewer for LevelDB files, and added new and updated...
View ArticleMagnet AXIOM 7.2 Now Available
We are thrilled to announce the release of Magnet AXIOM 7.2! This latest release introduces new features to help make it easier to access, view, and verify critical information from mobile sources for...
View ArticleHow To Get the Most Out of Your GrayKey Extractions
GrayKey extractions are an amazing tool for digital investigators and examiners, since getting a full file system image is crucial. For years, most forensic examinations of iOS devices were limited to...
View ArticleCL0P: Hunting a New Kind of Ransomware
This is a post authored by Matt Suiche (Director, Memory, IR & R&D). The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory...
View ArticleHow to Investigate Infostealer Malware
If you’re not familiar with infostealer malware—a type of malware specifically designed to locate and exfiltrate credentials—consider yourself lucky. And consider being prepared. In this article,...
View ArticleA Guide to Peak Software Performance for Magnet AXIOM
In this installment of our series, we will cover key software settings within Magnet AXIOM and AXIOM Cyber that will ensure you are getting the most from your hardware investment—following up on part...
View ArticleTrueBot Malware: What It Is and How to Hunt It
This is a post authored by Matt Suiche (Director, Memory, IR & R&D). The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a cybersecurity advisory...
View ArticleHow to Connect Magnet AXIOM Cyber Directly to VeraKey for Mobile Device...
Organizations leveraging VeraKey for their consent-based mobile device extractions are provided access to full file system acquisitions of both iOS and Android devices. These full file system images...
View ArticleIntroducing Magnet AXIOM 7.3: Video Preview, Lockscreen Data and More
We’re excited to announce the release of Magnet AXIOM 7.3! This latest version introduces a number of new features to help make your digital evidence analysis and reporting faster and easier, along...
View Article