Volunteer incident handlers donate their valuable time to analyze detects and anomalies, and post a daily diary of their analysis and thoughts on the Storm Center web site. Below you will find Handler details including personal pages, additional scripts or papers, or whatever the respective handler is interested in offering. All content is owned by the respective handler.
Interested in becoming a handler? A roadmap is available to learn how.
Current Handlers
John Bambenek
Guy Bruneau
Jim Clausing
Brad Duncan
Russell Eubanks
Scott Fendley
Deborah Hale
Jan Kopriva
Kevin Liston
Kyle Lysek
Renato Marinho
Russ McRee
Xavier Mertens
Richard Porter
Marcus Sachs
Manuel Humberto Santander Pelaez
Kevin Shortt
Didier Stevens
Johannes Ullrich
Rob VandenBrink
Remco Verhoef
Rick Wanner
Tom Webb
Daniel Wesemann
Bojan Zdrnja
John Bambenek

John Bambenek is President of Bambenek Labs, a threat intelligence and digital investigations firm. He has spent 20 years in the industry helping research emerging threats and leading large-scale intelligence sharing communities to engage in targeted disruption of criminal activities online. He has developed a variety of techniques to conduct digital surveillance that is used to monitor domain generation algorithms and malware configurations which are used by thousands of organizations world-wide. In addition, he tracks financial transactions of various neonazi and supremacist individuals and organizations. He has spoken at conferences around the world, has published two books in addition to several book chapters and articles, and he once appears on the Daily Show with Jon Stewart.
Twitter: | @bambenek |
---|
Recent Diaries:
- Writing Yara Rules for Fun and Profit: Notes from the FireEye Breach Countermeasures
- Hunting for SigRed Exploitation
- VMWare Security Advisory on DoS Vulnerability in ESXi
- MSFT July 2019 Patch Tuesday
- Solving the WHOIS and Privacy Problem: A Draft of Implementing WHOIS in DNS
Guy Bruneau

Guy has a B.A. (IT) from University of Quebec and holds the prestigious GIAC Security Expert (GSE) certification as well as the GIAC GSEC(G), GCIA(G), GCIH(G), GCUX(G), GCFA, GPEN certifications.
Twitter: | @guybruneau |
---|
Click to View Handler Page
Click to View Handler Created Tools
Recent Diaries:
- Obfuscated DNS Queries
- Protecting Home Office and Enterprise in 2021
- Secure Communication using TLS in Elasticsearch
- Is IP 91.199.118.137 testing Access to aahwwx.52host.xyz?
- Detecting Actors Activity with Threat Intel
Jim Clausing

Twitter: | @jclausing |
---|
Click to View Handler Page
Recent Diaries:
- Analysis Dridex Dropper, IoC extraction (guest diary)
- Setting up the Dshield honeypot and tcp-honeypot.py
- Stackstrings, type 2
- Seriously, SHA3 where art thou?
- Attack traffic on TCP port 9673
Upcoming Courses:
SANS Secure Japan 2021, Online | Japan Standard Time
March 01, 2021 - March 06, 2021
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
SANS Cyber Defence Japan 2021, Online | Japan Standard Time
June 28, 2021 - July 03, 2021
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
SANS Cyber Defence Japan 2021, Online | Japan Standard Time
June 28, 2021 - July 03, 2021
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Brad Duncan

Twitter: | @malware_traffic |
---|
Recent Diaries:
- Throwback Friday: An Example of Rig Exploit Kit
- Hancitor activity resumes after a hoilday break
- Emotet infections and follow-up malware
- End of Year Traffic Analysis Quiz
- Recent Qakbot (Qbot) activity
Russell Eubanks

Twitter: | @russelleubanks |
---|
Recent Diaries:
- After Action Review
- Visibility Gap of Your Security Tools
- What Assumptions Are You Making?
- Resolve to Be More Involved In Your Local Community - REVISITED
- Creative Hiring From Non-Traditional Places
Upcoming Courses:
SANS Amsterdam January 2021, Online | Central European Time
January 25, 2021 - January 29, 2021
Implementing and Auditing the Critical Security Controls - In-Depth
SANS Stay Sharp: Management & Cloud Feb 2021, Online | US Central
February 03, 2021 - February 04, 2021
A Practical Introduction to Cyber Security Risk Management
SANS Leadership & Cloud Security Training 2021, Online | US Eastern
March 29, 2021 - April 02, 2021
Leading Cybersecurity Change: Building a Security-Based Culture
Scott Fendley

Twitter: | @itsecuritygeek |
---|
Recent Diaries:
- Critical Vuln in vCenter vmdir (CVE-2020-3952)
- Oracle Critical Patch Update Release
- Gate to Fiesta exploit kit on 94.242.216.69
- VMWare ESX/ESXi Security Advisory
- Defending Against Web Server Denial of Service Attacks
Deborah Hale

Recent Diaries:
- Customer Service Frustration
- Email/password Frustration
- Holiday Safe Computing Tips
- Angler Exploit Kits Reported
- Cisco Security Advisories Issued
Jan Kopriva

Twitter: | @jk0pr |
---|
Recent Diaries:
- From a small BAT file to Mass Logger infostealer
- TLS 1.3 is now supported by about 1 in every 5 HTTPS servers
- Want to know what's in a folder you don't have a permission to access? Try asking your AV solution...
- A slightly optimistic tale of how patching went for CVE-2019-19781
- Heartbleed, BlueKeep and other vulnerabilities that didn't disappear just because we don't talk about them anymore
Kevin Liston

Recent Diaries:
- My Honeypot is Trendy, My Honeypot is Unpopular
- Sensor Ideas for DEFCON
- Weblogic Exploit Code Made Public (CVE-2018-2893)
- Reporting Malicious Websites in 2018
- Request for Packets: Port 15454
Kyle Lysek
Renato Marinho

Renato Marinho is Chief Research Officer at Morphus Labs. His journey in the area began in 2001, when he created Nettion, one of the first firewalls to use the contemporary UTM (Unified Threat Management) concept. Experienced in cyber security, Marinho was internationally recognized in 2016 by his research that unveiled Mamba, the first full disk encryption ransomware. At Morphus Labs, he oversees research, innovation and development of new products. Master and PhD candidate in Applied Informatics, he is also professor at University of Fortaleza teaching Computer Forensics in the post-graduate course. He is also a speaker having presented at Ignite Cybersecurity Conference, BSides Delaware, BSides Vienna, WSKS Portugal and Brazilian CSIRTs Forum.
Twitter: | @renato_marinho |
---|
Recent Diaries:
- Microsoft January 2021 Patch Tuesday
- Microsoft November 2020 Patch Tuesday
- Attackers Exploiting WebLogic Servers via CVE-2020-14882 to install Cobalt Strike
- Microsoft October 2020 Patch Tuesday
- Microsoft September 2020 Patch Tuesday
Russ McRee

Twitter: | @holisticinfosec |
---|
Click to View Handler Created Tools
Recent Diaries:
- Sooty: SOC Analyst's All-in-One Tool
- To the Brim at the Gates of Mordor Pt. 1
- Happy FouRth of July from the Internet Storm Center
- ISC Snapshot: SpectX IP Hitcount Query
- Cloud Security Features Don't Replace the Need for Personnel Security Capabilities
Xavier Mertens

Xavier Mertens is a freelance cyber security consultant based in Belgium. Xavier started his own company (https://xavier.mertens.consulting) in 2013 to offer pentesting, incident handling and forensic services. He holds GIAC,GFCE, GCFA, GXPN & GREM certifications and is also CISSP and CISA. Xavier has a blog about security (https://blog.rootshell.be) and is co-organizer of the BruCON security conference (http://www.brucon.org).
Twitter: | @xme |
---|
Recent Diaries:
- Malicious Word Document Delivering an Octopus Backdoor
- Malware Victim Selection Through WiFi Identification
- Python Backdoor Talking to a C2 Through Ngrok
- Live Patching Windows API Calls Using PowerShell
- Malicious Python Code and LittleSnitch Detection
Upcoming Courses:
SANS Paris March 2021, Online | Central European Time
March 08, 2021 - March 13, 2021
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
SANS Paris June 2021, Online | Central European Summer Time
June 14, 2021 - June 19, 2021
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Richard Porter

Twitter: | @packetalien |
---|
Click to View Handler Created Tools
Recent Diaries:
- Building a .freq file with Public Domain Data Sources
- What is "THAT" Address Doing on my Network
- MSFT June 2019 Patch Tuesday
- Microsoft December 2018 Patch Tuesday
- OctoPrint 3D Web Interfaces: EXPOSED, Port 5000 default
Marcus Sachs

Twitter: | @MarcusSachs |
---|
Recent Diaries:
- New Internet Storm Center Director
- A Day In The Life Of A DShield Sensor
- Stuxnet Analysis
- Cyber Security Awareness Month - Day 31 - Tying it all together
- Cyber Security Awareness Month - Day 15 - What Teachers Need to Know About Their Students
Manuel Humberto Santander Pelaez

Mr. Santander Pelaez currently serves as the Chief Information Security Officer of Puntos Colombia S.A.S. . in Medellin,Colombia. His areas of interest are Intrusion Detection, Computer Forensics, Incident Response, SCADA Security, Network Design and cyberwarfare.
Twitter: | @manuelsantander |
---|
Recent Diaries:
- Creating patched binaries for pentesting purposes
- Performing deception to OS Fingerprint (Part 1: nmap)
- SNMP service: still opened to the public and still queried by attackers
- Enumerating office365 users
- Merry christmas!
Kevin Shortt

Twitter: | @Kevin_Shortt |
---|
Recent Diaries:
- Windows 7 - End of Life
- CCPA - Quick Overview
- DVRIP Port 34567 - Uptick
- Curious SNMP Traffic Spike
- XOR DDOS Mitigation and Analysis
Didier Stevens

Didier Stevens (Microsoft MVP Consumer Security) holds many certifications from SANS, Microsoft, Cisco, ... He is a Senior Analyst (NVISO https://www.nviso.be). Didier started his own company in 2012 to provide IT security training services (http://DidierStevensLabs.com). You can find his open source security tools on his IT security related blog at https://blog.DidierStevens.com.
Twitter: | @DidierStevens |
---|
Recent Diaries:
- New Release of Sysmon Adding Detection for Process Tampering
- Maldoc Analysis With CyberChef
- Maldoc Strings Analysis
- Strings 2021
- Quickie: Bit Shifting With translate.py
Johannes Ullrich

Dr. Johannes Ullrich is the Dean of Research and a faculty member of the SANS Technology Institute. In November of 2000, Johannes started the DShield.org project, which he later integrated into the Internet Storm Center. His work with the Internet Storm Center has been widely recognized. In 2004, Network World named him one of the 50 most powerful people in the networking industry. Secure Computing Magazine named him in 2005 one of the Top 5 influential IT security thinkers. His research interests include IPv6, Network Traffic Analysis and Secure Software Development. Johannes is regularly invited to speak at conferences and has been interviewed by major publications, radio as well as TV stations. He is a member of the SANS Technology Institute's Faculty and Administration as well as Curriculum and Long Range Planning Committee. As chief research officer for the SANS Institute, Johannes is currently responsible for the GIAC Gold program. Prior to working for SANS, Johannes worked as a lead support engineer for a Web development company and as a research physicist. Johannes holds a PhD in Physics from SUNY Albany and is located in Jacksonville, Florida. More Details: http://www.linkedin.com/in/johannesullrich
Twitter: | @johullrich |
---|
Click to View Handler Page
Recent Diaries:
- Scans for Zyxel Backdoors are Commencing.
- Netfox Detective: An Alternative Open-Source Packet Analysis Tool
- SolarWinds Breach Used to Infiltrate Customer Networks (Solarigate)
- December 2020 Microsoft Patch Tuesday: Exchange, Sharepoint, Dynamics and DNS Spoofing
- The special case of TCP RST
Upcoming Courses:
SANS Cyber Security West: March 2021, Online | US Pacific
March 15, 2021 - March 20, 2021
Defending Web Applications Security Essentials
SANS Baltimore Spring: Virtual Edition 2021, Online | US Eastern
April 26, 2021 - May 01, 2021
Intrusion Detection In-Depth
SANS Paris June 2021, Online | Central European Summer Time
June 14, 2021 - June 19, 2021
Defending Web Applications Security Essentials
Rob VandenBrink

Twitter: | @rvandenbrink |
---|
Click to View Handler Created Tools
Recent Diaries:
- Using the NVD Database and API to Keep Up with Vulnerabilities and Patches - Tool Drop: CVEScan (Part 3 of 3)
- Using the NIST Database and API to Keep Up with Vulnerabilities and Patches - Playing with Code (Part 2 of 3)
- Using the NIST Database and API to Keep Up with Vulnerabilities and Patches (Part 1 of 3)
- What's in Your Clipboard? Pillaging and Protecting the Clipboard
- Office 365 Mail Forwarding Rules (and other Mail Rules too)
Remco Verhoef

Twitter: | @remco_verhoef |
---|
Recent Diaries:
- Sigma rules! The generic signature format for SIEM systems.
- Not so FastCGI!
- Annotating Golang binaries with Cutter and Jupyter
- Introduction to analysing Go binaries
- Binary Analysis with Jupyter and Radare2
Rick Wanner

Twitter: | @namedeplume |
---|
Recent Diaries:
- What's the deal with openportstats.com?
- Threat Hunting with JARM
- CVE-2020-5135 - Buffer Overflow in SonicWall VPNs - Patch Now
- ISC Blocked
- Password Reuse Strikes Again!
Tom Webb

Twitter: | @twsecblog |
---|
Recent Diaries:
- Elastalert with Sigma
- Pi Zero HoneyPot
- TPOT's Cowrie to ISC Logs
- Using Shodan Monitoring
- CVE-2019-0604 Attack
Daniel Wesemann

Recent Diaries:
- DNS Logs in Public Clouds
- Preventing Exposed Azure Blob Storage
- Exposed Blob Storage in Azure
- Shipping dangerous goods
- IOC's turning into IOOI's
Bojan Zdrnja

Twitter: | @bojanz |
---|
Click to View Handler Created Tools
Recent Diaries:
- Dynamically analyzing a heavily obfuscated Excel 4 macro malicious file
- Scoping web application and web service penetration tests
- Scanning with nmap?s NSE scripts
- Summing up CVE-2020-0601, or the Let?s Decrypt vulnerability
- Getting the best value out of security assessments
Upcoming Courses:
SANS Amsterdam January 2021, Online | Central European Time
January 25, 2021 - January 30, 2021
Web App Penetration Testing and Ethical Hacking
SANS Cyber Security East: March 2021, Online | US Eastern
March 01, 2021 - March 06, 2021
Web App Penetration Testing and Ethical Hacking
SANS London April 2021, Online | British Summer Time
April 12, 2021 - April 17, 2021
Web App Penetration Testing and Ethical Hacking