Volunteer incident handlers donate their valuable time to analyze detects and anomalies, and post a daily diary of their analysis and thoughts on the Storm Center web site. Below you will find Handler details including personal pages, additional scripts or papers, or whatever the respective handler is interested in offering. All content is owned by the respective handler.
Interested in becoming a handler? A roadmap is available to learn how.
Current Handlers
Guy Bruneau
Jim Clausing
Brad Duncan
Scott Fendley
Jan Kopriva
Renato Marinho
Russ McRee
Xavier Mertens
Richard Porter
Marcus Sachs
Manuel Humberto Santander Pelaez
Didier Stevens
Yee Ching Tok
Johannes Ullrich
Rob VandenBrink
Rick Wanner
Tom Webb
Daniel Wesemann
Bojan Zdrnja
Guy Bruneau

Guy has a B.A. (IT) from University of Quebec and holds the prestigious GIAC Security Expert (GSE) certification as well as the GIAC GSEC(G), GCIA(G), GCIH(G), GCUX(G), GCFA, GPEN certifications.
Twitter: | @guybruneau |
---|
Click to View Handler Page
Click to View Handler Created Tools
Recent Diaries:
- Phishing PDF Received in my ISC Mailbox
- Are Roku Streaming Devices Safe from Exploitation?
- Is buying Cyber Insurance a Must Now?
- Using Snort IDS Rules with NetWitness PacketDecoder
- DHL Spear Phishing to Capture Username/Password
Jim Clausing

Twitter: | @jclausing |
---|
Click to View Handler Page
Recent Diaries:
- Is this traffic bAD?
- Update: mac-robber.py
- Strange goings on with port 37
- Wireshark 3.4.6 (and 3.2.14) released
- So where did those Satori attacks come from?
Upcoming Courses:
SANS Cyber Defence Australia 2022, Online | Australia Eastern
June 20, 2022 - June 25, 2022
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
SANS Cyber Defence Australia 2022 - Live Online, Online | Australia Eastern
June 20, 2022 - June 25, 2022
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
SANS Cyber Defence Japan 2022 - Live Online, Online | Japan Standard Time
June 27, 2022 - July 02, 2022
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Brad Duncan

Twitter: | @malware_traffic |
---|
Recent Diaries:
- Bumblebee Malware from TransferXL URLs
- TA578 using thread-hijacked emails to push ISO files for Bumblebee malware
- Password-protected Excel spreadsheet pushes Remcos RAT
- "aa" distribution Qakbot (Qbot) infection with DarkVNC traffic
- Windows MetaStealer Malware
Scott Fendley

Twitter: | @itsecuritygeek |
---|
Recent Diaries:
- Warranty Repairs and Non-Removable Storage Risks
- Apple May 2021 Security Updates
- Critical Vuln in vCenter vmdir (CVE-2020-3952)
- Oracle Critical Patch Update Release
- Gate to Fiesta exploit kit on 94.242.216.69
Jan Kopriva

Twitter: | @jk0pr |
---|
Recent Diaries:
- Do you want 30 BTC? Nothing is easier (or cheaper) in this phishing campaign...
- What is the simplest malware in the world?
- MITRE ATT&CK v11 - a small update that can help (not just) with detection engineering
- How is Ukrainian internet holding up during the Russian invasion?
- Over 20 thousand servers have their iLO interfaces exposed to the internet, many with outdated and vulnerable versions of FW
Renato Marinho

Renato Marinho is Chief Research Officer at Morphus Labs. His journey in the area began in 2001, when he created Nettion, one of the first firewalls to use the contemporary UTM (Unified Threat Management) concept. Experienced in cyber security, Marinho was internationally recognized in 2016 by his research that unveiled Mamba, the first full disk encryption ransomware. At Morphus Labs, he oversees research, innovation and development of new products. Master and PhD candidate in Applied Informatics, he is also professor at University of Fortaleza teaching Computer Forensics in the post-graduate course. He is also a speaker having presented at Ignite Cybersecurity Conference, BSides Delaware, BSides Vienna, WSKS Portugal and Brazilian CSIRTs Forum.
Twitter: | @renato_marinho |
---|
Recent Diaries:
- Microsoft May 2022 Patch Tuesday
- WSO2 RCE exploited in the wild
- Microsoft April 2022 Patch Tuesday
- Microsoft March 2022 Patch Tuesday
- Microsoft February 2022 Patch Tuesday
Russ McRee

Twitter: | @holisticinfosec |
---|
Click to View Handler Created Tools
Recent Diaries:
- Log4j 2 Security Vulnerabilities Update Guide
- LotL Classifier tests for shells, exfil, and miners
- Adversary Simulation with Sim
- Gordon for fast cyber reputation checks
- Sooty: SOC Analyst's All-in-One Tool
Xavier Mertens

Xavier Mertens is a freelance security consultant based in Belgium. Xavier's own company (https://xameco.be) offers services like incident handling, forensic, SOC activities, and pentesting. He holds GCIA, GFCE, GCFA, GXPN, GREM, GDAT, GNFA, GCTI, GPYC SANS certifications but also CISSP, and CISA. Xavier is a SANS Certified Instructor (FOR610 - Malware Analysis and Reverse Engineering). His blog about security is https://blog.rootshell.be and he is co-organizer of the BruCON security conference (http://www.brucon.org).
Twitter: | @xme |
---|
Recent Diaries:
- A 'Zip Bomb' to Bypass Security Controls & Sandboxes
- Use Your Browser Internal Password Vault... or Not?
- Octopus Backdoor is Back with a New Embedded Obfuscated Bat File
- Simple PDF Linking to Malicious Content
- Multi-Cryptocurrency Clipboard Swapper
Upcoming Courses:
SANS London June 2022, London
June 06, 2022 - June 11, 2022
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
SANS London June 2022 - Live Online, Online | British Summer Time
June 06, 2022 - June 11, 2022
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
SANS Munich June 2022, Munich
June 27, 2022 - July 02, 2022
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Richard Porter

Twitter: | @packetalien |
---|
Click to View Handler Created Tools
Recent Diaries:
- A Case for Lockdown and Isolation (and not the Covid kind)
- Microsoft April 2021 Patch Tuesday
- Building a .freq file with Public Domain Data Sources
- What is "THAT" Address Doing on my Network
- MSFT June 2019 Patch Tuesday
Marcus Sachs

Twitter: | @MarcusSachs |
---|
Recent Diaries:
- New Internet Storm Center Director
- A Day In The Life Of A DShield Sensor
- Stuxnet Analysis
- Cyber Security Awareness Month - Day 31 - Tying it all together
- Cyber Security Awareness Month - Day 15 - What Teachers Need to Know About Their Students
Manuel Humberto Santander Pelaez

Mr. Santander Pelaez currently serves as the Chief Information Security Officer of Puntos Colombia S.A.S. . in Medellin,Colombia. His areas of interest are Intrusion Detection, Computer Forensics, Incident Response, SCADA Security, Network Design and cyberwarfare.
Twitter: | @manuelsantander |
---|
Recent Diaries:
- More packet fu with zeek
- Creating patched binaries for pentesting purposes
- Performing deception to OS Fingerprint (Part 1: nmap)
- SNMP service: still opened to the public and still queried by attackers
- Enumerating office365 users
Didier Stevens

Didier Stevens (Microsoft MVP Consumer Security) holds many certifications from SANS, Microsoft, Cisco, ... He is a Senior Analyst (NVISO https://www.nviso.be). Didier started his own company in 2012 to provide IT security training services (http://DidierStevensLabs.com). You can find his open source security tools on his IT security related blog at https://blog.DidierStevens.com.
Twitter: | @DidierStevens |
---|
Recent Diaries:
- Wireshark 3.6.5 Released
- Quick Analysis Of Phishing MSG
- Detecting VSTO Office Files With ExifTool
- YARA 4.2.1 Released
- Analyzing a Phishing Word Document
Yee Ching Tok

Yee Ching is currently a Ph.D. student at ASSET (Automated Systems SEcuriTy) Research Group in the Singapore University of Technology and Design (SUTD) under the Information Systems Technology and Design (ISTD) Pillar. He was a recipient of the SG: Digital (SG:D) Postgraduate Scholarship program from Infocomm Media Development Authority (IMDA), and won the Cybersecurity Awards in 2019 under the Professional category for his contributions to the Singapore information security industry. Yee Ching is a SANS Lethal Forensicator and also serves as a Committee Member in the Association of Information Security Professionals (AiSP). For more information, please visit https://poppopretn.com/aboutme/.
Twitter: | @poppopretn |
---|
Recent Diaries:
- Phishing Direct Messages via Discord
- Revisiting BrakTooth: Two Months Later
- Multiple Apple Patches for October 2021
- Hunting for Phishing Sites Masquerading as Outlook Web Access
- Keeping Track of Time: Network Time Protocol and a GPSD Bug
Johannes Ullrich

Dr. Johannes Ullrich is the Dean of Research and a faculty member of the SANS Technology Institute. In November of 2000, Johannes started the DShield.org project, which he later integrated into the Internet Storm Center. His work with the Internet Storm Center has been widely recognized. In 2004, Network World named him one of the 50 most powerful people in the networking industry. Secure Computing Magazine named him in 2005 one of the Top 5 influential IT security thinkers. His research interests include IPv6, Network Traffic Analysis and Secure Software Development. Johannes is regularly invited to speak at conferences and has been interviewed by major publications, radio as well as TV stations. He is a member of the SANS Technology Institute's Faculty and Administration as well as Curriculum and Long Range Planning Committee. As chief research officer for the SANS Institute, Johannes is currently responsible for the GIAC Gold program. Prior to working for SANS, Johannes worked as a lead support engineer for a Web development company and as a research physicist. Johannes holds a PhD in Physics from SUNY Albany and is located in Jacksonville, Florida. More Details: http://www.linkedin.com/in/johannesullrich
Twitter: | @johullrich |
---|
Click to View Handler Page
Recent Diaries:
- Apple Patches Everything
- Why is my Honeypot a Russian Certificate Authority?
- From 0-Day to Mirai: 7 days of BIG-IP Exploits
- F5 BIG-IP Unauthenticated RCE Vulnerability (CVE-2022-1388)
- Some Honeypot Updates
Upcoming Courses:
SANS London June 2022, London
June 06, 2022 - June 11, 2022
Application Security: Securing Web Apps, APIs, and Microservices
SANS London June 2022 - Live Online, Online | British Summer Time
June 06, 2022 - June 11, 2022
Application Security: Securing Web Apps, APIs, and Microservices
SANSFIRE 2022, Washington
July 11, 2022 - July 16, 2022
Application Security: Securing Web Apps, APIs, and Microservices
Rob VandenBrink

Twitter: | @rvandenbrink |
---|
Click to View Handler Created Tools
Recent Diaries:
- When Get-WebRequest Fails You
- Finding the Real "Last Patched" Day (Interim Version)
- Using Passive DNS sources for Reconnaissance and Enumeration
- Geoblocking when you can't Geoblock
- DR Automation - Using Public DNS APIs
Rick Wanner

Twitter: | @namedeplume |
---|
Recent Diaries:
- New Windows Print Spooler Vulnerability - CVE-2021-34481
- Mitre CWE - Common Weakness Enumeration
- Quick and dirty Python: nmap
- Quick and dirty Python: masscan
- Important Apple Updates
Tom Webb

Twitter: | @twsecblog |
---|
Recent Diaries:
- Xmount for Disk Images
- Elastalert with Sigma
- Pi Zero HoneyPot
- TPOT's Cowrie to ISC Logs
- Using Shodan Monitoring
Daniel Wesemann

Recent Diaries:
- Open redirects ... and why Phishers love them
- Network Forensics on Azure VMs (Part #2)
- Network Forensics on Azure VMs (Part #1)
- Ransomware Defenses
- Exposed Azure Storage Containers
Bojan Zdrnja

Twitter: | @bojanz |
---|
Click to View Handler Created Tools
Recent Diaries:
- Local privilege escalation vulnerability in polkit's pkexec (CVE-2021-4034)
- RCE in log4j, Log4Shell, or how things can get bad quickly
- Active Directory Certificate Services (ADCS - PKI) domain admin vulnerability
- Summer of SAM - incorrect permissions on Windows 10/11 hives
- Abusing Google Chrome extension syncing for data exfiltration and C&C
Upcoming Courses:
SANS Pen Test Hackfest Europe 2022 - Berlin, Online | Central European Summer Time
July 25, 2022 - July 30, 2022
Web App Penetration Testing and Ethical Hacking
SANS Pen Test Hackfest Europe 2022 - Berlin - Live Online, Online | Central European Summer Time
July 25, 2022 - July 30, 2022
Web App Penetration Testing and Ethical Hacking
SANS Cyber Safari 2022, Riyadh
October 08, 2022 - October 13, 2022
Web App Penetration Testing and Ethical Hacking