Click here to download all references as Bib-File.
2023-05-30 ⋅ Trend Micro ⋅ Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals ROMCOM RAT |
2022-11-08 ⋅ DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework DeimosC2 |
2022-03-17 ⋅ Trendmicro ⋅ Cyclops Blink Sets Sights on Asus Routers CyclopsBlink |
2022-03-17 ⋅ Trendmicro ⋅ Cyclops Blink Sets Sights on Asus Routers (Appendix) CyclopsBlink |
2021-06-08 ⋅ Trend Micro ⋅ Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them Nefilim |
2020-12-17 ⋅ Trend Micro ⋅ Pawn Storm’s Lack of Sophistication as a Strategy DriveOcean |
2020-03-11 ⋅ Trend Micro ⋅ Pawn Storm in 2019: A Year of Scanning and Credential Phishing on High-Profile Targets |
2019-12-12 ⋅ Trend Micro ⋅ More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting APT33 |
2016-03 ⋅ Trend Micro ⋅ Operation C-Major: Information Theft Campaign Targets Military Personnel in India Operation C-Major |
2015-10-22 ⋅ Trend Micro ⋅ Pawn Storm Targets MH17 Investigation Team APT28 |
2015-10-13 ⋅ Trend Micro ⋅ New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries Seduploader |
2015-10-13 ⋅ Trend Micro ⋅ New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries APT28 |
2015-02-04 ⋅ Trend Micro ⋅ Pawn Storm Update: iOS Espionage App Found X-Agent |
2014-10-27 ⋅ Trend Micro ⋅ Operation Pawn Storm: Using Decoys to Evade Detection Sedreco Seduploader APT28 |
2014-10 ⋅ Trend Micro ⋅ Operation Pawn Storm: Using Decoys to Evade Detection |
2012 ⋅ CSIS Trend Micro ⋅ W32.Tinba (Tinybanker) The Turkish Incident Tinba |