<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CERT-W Stormcell - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/cert-w-stormcell/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/cert-w-stormcell/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 16 Apr 2026 12:55:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>CERT-W Stormcell - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/cert-w-stormcell/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>StormCell: How our blue team scales up incident response</title>
		<link>https://www.riskinsight-wavestone.com/en/2026/04/stormcell-how-our-blue-team-scales-up-incident-response/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/04/stormcell-how-our-blue-team-scales-up-incident-response/#respond</comments>
		
		<dc:creator><![CDATA[Clément Gonnaud]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 12:10:04 +0000</pubDate>
				<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[CERT-W Stormcell]]></category>
		<category><![CDATA[CERT-Wavestone]]></category>
		<category><![CDATA[Cyber incident response]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[forensic]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[Indicators of Compromise]]></category>
		<category><![CDATA[investigation]]></category>
		<category><![CDATA[IoC]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Windows Forensics]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29788</guid>

					<description><![CDATA[<p>CERT-Wavestone handles cybersecurity incidents of all types and magnitudes, from investigating a single suspicious workstation to large-scale overnight ransomware outbreaks. After 10 years of forensics investigations and crisis management at Wavestone, one thing stands out: attackers are more sophisticated than...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/04/stormcell-how-our-blue-team-scales-up-incident-response/">StormCell: How our blue team scales up incident response</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><strong>CERT-Wavestone handles cybersecurity incidents of all types and magnitudes,</strong> from investigating a single suspicious workstation to large-scale overnight ransomware outbreaks. After 10 years of forensics investigations and crisis management at Wavestone, one thing stands out: <strong>attackers are more sophisticated than ever, and every hour matters for blue teams.</strong></p>
<p style="text-align: justify;">When CERT-Wavestone is called, three priorities drive every action and decision making:<strong> containing the threat, understanding the attack and eradicating the attacker.</strong> To achieve these objectives,<strong> establishing visibility</strong> across the impacted perimeter is the <strong>critical first step</strong>.</p>
<p style="text-align: justify;">In such contexts where<strong> speed and effectiveness are mandatory,</strong> CERT-Wavestone relies on many tools: cybersecurity solutions (EDR, SIEM, etc.), open-source collectors and parsers, and its own internally developed tools.</p>
<p style="text-align: justify;">Among these, <strong>StormCell stands out as an open-source tool developed by CERT-Wavestone</strong> to automate Windows triage processing and<strong> free analysts’ time to focus on what truly matters: the investigation itself.</strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Contain. Understand. Eradicate. Every hour counts.</h2>
<h3 style="text-align: justify;">Increasingly effective attackers</h3>
<p style="text-align: justify;">Several cybersecurity incident response actors agree that <strong>certain types of cyberattacks</strong>, such as ransomware and data exfiltration attacks, <strong>are becoming increasingly fast paced.</strong> The charts published by Zero Day Clock (<span style="color: #451dc7;"><a style="color: #451dc7;" href="https://zerodayclock.com">https://zerodayclock.com</a></span>) illustrate this trend:</p>
<ul style="text-align: justify;">
<li><strong>A growing share of zero day vulnerabilities are being actively exploited each year</strong>, rising from 16% in 2018 to 71% in 2026,</li>
<li><strong>A decreasing time to exploit</strong> (TTE) for these vulnerabilities is noted, falling from several years in 2018 to less than one day in 2026.</li>
</ul>
<p style="text-align: justify;">This is also a <strong>commonly shared observation among Wavestone’s incident response team</strong> in its latest annual report (see: <a href="https://www.wavestone.com/en/insight/2025-wavestone-cert-report/"><span style="color: #451dc7;">CERT-Wavestone annual report</span></a>), which is based on a set of around twenty major incidents affecting Wavestone clients during 2025:</p>
<figure id="attachment_29792" aria-describedby="caption-attachment-29792" style="width: 1688px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="size-full wp-image-29792" style="border: 1px solid #000000;" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/1-Ransomware-An-end-to-end-attack-in-15-days-e1776342358749.png" alt="Ransomware - An end-to-end attack in 1,5 days" width="1688" height="943" /><figcaption id="caption-attachment-29792" class="wp-caption-text"><em>Ransomware &#8211; An end-to-end attack in 1,5 days</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">As a result, to contain and remediate incidents as early as possible our incident response team <strong>must be effective in its analysis and decision‑making</strong>. This requires an especially <strong>quick understanding of the context and of the incident.</strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">The anatomy of a CERT-Wavestone investigation</h2>
<p style="text-align: justify;">Each CERT-Wavestone investigation typically begins with a limited scope before rapidly expanding to cover dozens of systems as the situation evolves:</p>
<ul style="text-align: justify;">
<li><strong>Stage 1 — Initial analysis:</strong> Once the perimeter is secured and initial containment measures are in place, CERT-Wavestone is engaged and assesses the situation on a <strong>handful of suspicious or confirmed compromised machines.</strong> If the client has a SOC or CERT, existing telemetry and detection tooling provide an immediate starting point. If not, CERT-Wavestone leverages available resources to perform initial forensic collections and <strong>outline an initial overview of the attack.</strong></li>
<li><strong>Stage 2 — Broader investigation:</strong> As the killchain becomes clearer, the investigation expands to dozens of compromised machines. When the client’s infrastructure cannot support <strong>large-scale acquisitions,</strong> CERT-Wavestone <strong>deploys its own forensic collection tool to gather triage data efficiently.</strong></li>
<li><strong>Stage 3 — IoC hunting across the entire IS:</strong> Indicators of compromise are established, and the search extends to the entire information system. If not already in place, <strong>EDR or alternative tools can be deployed by CERT-Wavestone</strong>. Large-scale IoC sweeps rely on the built-in capabilities of the EDR, SIEM or log collection platforms.</li>
</ul>
<p style="text-align: justify;">Whether on Stage 1 or Stage 2, each collection requires the<strong> same standardized pipeline:</strong> retrieval, parsing, ingestion, Indicator of Compromise (IoC) identification, and cross-collection correlation. Consequently, <strong>manual forensic processing consumes valuable time and effort,</strong> forcing analysts to handle routine data operations instead of focusing on investigations.</p>
<p style="text-align: justify;"><strong>Handling each collection individually</strong> by each analyst <strong>is slow, prone to errors and discrepancies,</strong> and <strong>poorly scales</strong> to the <strong>number of machines</strong> to investigate, and the<strong> number of analysts</strong> mobilized on the incident.</p>
<p style="text-align: justify;"><strong>This is precisely the problem that StormCell, a tool developed by the CERT-W, was designed to solve.</strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">StormCell : what is it ?</h2>
<p style="text-align: justify;">StormCell is a tool developed by CERT-Wavestone to address a <strong>long-standing need:</strong> a Windows forensic analysis orchestrator that <strong>adapts to multiple investigation contexts, automates the end-to-end processing of triage data</strong> from artifact extraction to centralized ingestion into a SIEM platform, and frees analysts to <strong>focus on the investigation</strong>, not the pipeline.</p>
<p style="text-align: justify;">Developed in Python to make it easy to use, <strong>the tool was recently published on GitHub</strong> so that the entire incident response community can access it as open source: <strong><span style="color: #451dc7;"><a style="color: #451dc7;" href="https://github.com/CERT-W/StormCell">https://github.com/CERT-W/StormCell</a></span></strong>. <strong>CERT‑Wavestone intends for this tool to be used, tested, and improved directly by the community.</strong></p>
<p style="text-align: justify;">Although other similar tools have been developed and released since the beginning of its development, <strong>StormCell stands out through its modularity and its underlying technology choices, both geared towards speed and adaptability.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Three key stages : ingest, process and enrich, centralize</h3>
<p style="text-align: justify;">StormCell’s workflow is based on three key stages:</p>
<figure id="attachment_29799" aria-describedby="caption-attachment-29799" style="width: 1750px" class="wp-caption aligncenter"><img decoding="async" class="wp-image-29799 size-full" style="border: 1px solid #000000;" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old.png" alt="Three key stages - Ingest, Process and Enrich, Centralize_old" width="1750" height="774" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old.png 1750w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old-432x191.png 432w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old-768x340.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old-1536x679.png 1536w" sizes="(max-width: 1750px) 100vw, 1750px" /><figcaption id="caption-attachment-29799" class="wp-caption-text"><em>Three key stages &#8211; Ingest, Process and Enrich, Centralize</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">To properly perform those steps, StormCell relies on several third-party tools : whether it is for artifacts collection with <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://www.kroll.com/en/services/cyber/incident-response-recovery/kroll-artifact-parser-and-extractor-kape">Kape</a></span>, enrichment and ingestion of logs into a SIEM with <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://vector.dev/">Vector</a></span> or SIEM built-in functionalities with <a href="https://www.splunk.com/"><span style="color: #451dc7;">Splunk</span></a> or <a href="https://www.elastic.co/fr/elastic-stack"><span style="color: #451dc7;">ELK</span>.</a></p>
<p style="text-align: justify;">Despite these dependencies, <strong>the tool only needs to be installed and configured once on a single workstation before it can be used throughout the incident response by all analysts.</strong></p>
<p> </p>
<h3 style="text-align: justify;">Extract and Ingest</h3>
<p style="text-align: justify;">StormCell is designed to work with <strong>two types of forensics collections:</strong> disk images and artifact ZIP extracts produced by Kape.</p>
<p style="text-align: justify;">When StormCell is run against a disk image, it directly <strong>uses Kape to extract the relevant artifacts.</strong></p>
<p style="text-align: justify;">Compatible ZIP archives can also be generated with the CERT‑Wavestone tool <a href="https://github.com/CERT-W/CollectRaptor"><span style="color: #451dc7;">CollectRaptor</span></a>, which is based on Velociraptor, or with any other collection performed using the Velociraptor KapeTarget module.</p>
<p> </p>
<h3 style="text-align: justify;">Process and Enrich</h3>
<p style="text-align: justify;">Once raw artifacts are extracted, the core of the processing chain comes into play: <strong>the artifacts are processed with Kape.</strong></p>
<p style="text-align: justify;">Kape is used because it is a <strong>tool dedicated to Windows forensics artifacts parsing</strong>. It allows, through modules, to automatically execute several tools such as the <a href="https://ericzimmerman.github.io/#!index.md"><span style="color: #451dc7;">Zimmerman Suite</span></a>, <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://github.com/Yamato-Security/hayabusa">Hayabusa</a></span> or even <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://github.com/WithSecureLabs/chainsaw">Chainsaw</a></span>. Moreover, logs parsed by Kape are <strong>directly organized on the filesystem by artifact category</strong> (executions, filesystem, registries, etc.) allowing to perform efficient local and manual analysis whenever necessary.</p>
<p style="text-align: justify;">As a whole, StormCell <strong>uses Kape to run more than thirty artifact‑processing tools</strong>, each covering a complementary analysis scope and <strong>ensuring a high level of exhaustiveness for the elements available to analysts.</strong></p>
<p style="text-align: justify;">All these tools <strong>can be easily downloaded through the StormCell installation command</strong> described in its Readme. <strong>StormCell’s modular configuration</strong> also makes it <strong>simple to integrate new artifact‑processing tools as needed.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Centralize</h3>
<p style="text-align: justify;">Once the artifacts have been parsed by Kape,<strong> the generated logs are normalized, enriched, and sent to a SIEM platform through Vector,</strong> an open‑source tool <strong>particularly well‑suited to handling large volumes of data.</strong></p>
<p style="text-align: justify;">To determine which artifacts to send, as well as the normalizations and enrichments to apply, <strong>Vector relies on its TOML configuration files. These files include parsers that structure raw data into meaningful fields, and sinks (output destinations) that route events to the target environment,</strong> whether a client’s ELK or Splunk instance, or an internal ELK instance dedicated to CERT‑Wavestone.</p>
<p style="text-align: justify;">To retrieve these configurations, <strong>StormCell uses the configuration files from the GitHub repository <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://github.com/Qazeer/Vector4IR">Vector4IR</a> </span></strong>whose CERT‑Wavestone is a contributor.</p>
<p> </p>
<h3 style="text-align: justify;">A major time-saver for analysts</h3>
<p style="text-align: justify;">By chaining these three stages together, <strong>each forensic collection only needs to be processed once before it becomes available in the SIEM for all analysts</strong>. This makes it possible to carry out global investigations while fully <strong>leveraging the built‑in capabilities of SIEM technologies:</strong> search languages, dashboards and saved searches, lookups and data tables, correlation features, and so on.</p>
<p style="text-align: justify;">The retrieval of collections and their<strong> handling with StormCell can be handled by a single analyst, while the others can already begin investigating in real time</strong> as the logs are being sent.</p>
<p> </p>
<h2 style="text-align: justify;">StormCell execution modes</h2>
<p style="text-align: justify;">According to the setup and configuration details provided in the Readme of the <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://github.com/CERT-W/StormCell">Github repository</a></span>,<strong> a dedicated setup command can be used to download all the tools required</strong> for StormCell to properly operate. In addition, <strong>numerous options,</strong> described in the default configuration file and the help command, <strong>are available to accommodate different execution requirements.</strong></p>
<p style="text-align: justify;">For example, <strong>it is possible to specify which Kape modules should run, or to force a fresh processing and re‑ingestion of logs.</strong> Because StormCell <strong>uses a local database file to maintain state across successive executions,</strong> its behavior can be completely reset by removing this database.</p>
<p style="text-align: justify;">Finally, StormCell offers <strong>three complementary execution modes,</strong> designed to adapt to every investigation context, from small scopes to large‑scale crises, and to let analysts be operational as quickly as possible, regardless of the types of resources available to them.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Once mode: small scopes and need for rapid investigation</h3>
<p style="text-align: justify;"><strong>Designed specifically for targeted investigations</strong> on a limited scope, this mode <strong>handles a set of preexisting collections in a single execution.</strong></p>
<p style="text-align: justify;">After an initial configuration by the analysts, <strong>the tool executes and enables the analysis of the collections without any additional steps.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Mountpoint mode: local collect and analysis in a single command</h3>
<p style="text-align: justify;">Mountpoint is StormCell’s end‑to‑end execution mode:<strong> from collecting artifacts on a disk or a locally mounted forensic copy all the way to sending them into the SIEM.</strong></p>
<p style="text-align: justify;">This mode is preferred when analyzing disk copies, and it <strong>natively includes artifact extraction through Kape’s built‑in capabilities.</strong> Once the extraction is complete, <strong>its behavior is similar to the Once mode.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Loop mode : Continuous processing for large‑scale investigations</h3>
<p style="text-align: justify;">CERT-Wavestone’s preferred mode, it is <strong>designed for large‑scale crises</strong> and aims to enable StormCell to run continuously throughout the incident. Once configured, the tool monitors a designated folder and automatically processes all collections placed there by the analysts.</p>
<p style="text-align: justify;"><strong>This centralized drop‑off folder becomes the logistical core of the investigation:</strong> once it is set up, analysts no longer need to worry about processing collections, whether the incident lasts a few days or several weeks, and<strong> can simply deposit the triage images then access the processed data in the SIEM platform being used.</strong></p>
<p style="text-align: justify;">Finally, <strong>two levels of artifact processing can be configured</strong> to best match analysts’ needs when investigations are carried out <strong>on new machines:</strong></p>
<ul style="text-align: justify;">
<li><strong>Short</strong>: a <strong>lightweight treatment</strong> prioritizing speed, suited to surface‑level analyses that quickly assess a machine and help prioritize investigations.</li>
<li><strong>Long</strong>: an <strong>exhaustive treatment</strong> that activates in‑depth analysis modules, intended for detailed investigations requiring a full view of the machine’s activity.</li>
</ul>
<p style="text-align: justify;"><strong>The modules to be executed in both modes can be freely configured</strong> by the analyst using StormCell. These two complementary modes make it possible to deposit archives initially into the <strong>Short folder to obtain a quick but non-exhaustive list of artifacts</strong>, then later in the investigations, deposit them into the <strong>Long folder to obtain an exhaustive list of artifacts.</strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">StormCell : What’s next ?</h2>
<p style="text-align: justify;">StormCell is currently a key tool frequently used within CERT‑Wavestone to accelerate the processing of Windows artifacts during its investigations.</p>
<p style="text-align: justify;"><strong>Its orchestration capabilities are planned to be extended to investigations on Cloud environments, particularly M365, as well as Linux and macOS,</strong> while also exploring the integration of new forensic sources and advanced technologies such as the use of AI.</p>
<p style="text-align: justify;">That’s why CERT‑Wavestone invites you to <strong>contribute to its evolution:</strong> forks, pull requests, and feedback from your operational experience are welcome, so that StormCell can become the most suitable tool possible for incident response needs.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/04/stormcell-how-our-blue-team-scales-up-incident-response/">StormCell: How our blue team scales up incident response</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/04/stormcell-how-our-blue-team-scales-up-incident-response/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
