Click here to download all references as Bib-File.
2023-05-24 ⋅ Zscaler ⋅ Technical Analysis of Pikabot Pikabot |
2022-09-30 ⋅ NCC Group ⋅ A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion ShadowPad |
2022-05-05 ⋅ NCC Group ⋅ North Korea’s Lazarus: their initial access trade-craft using social media and social engineering LCPDot |
2022-04-29 ⋅ NCC Group ⋅ Adventures in the land of BumbleBee – a new malicious loader BazarBackdoor BumbleBee Conti |
2022-03-31 ⋅ nccgroup ⋅ Conti-nuation: methods and techniques observed in operations post the leaks Cobalt Strike Conti QakBot |
2021-12-01 ⋅ NCC Group ⋅ Tracking a P2P network related to TA505 FlawedGrace Necurs |
2020-06-23 ⋅ NCC Group ⋅ WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group Cobalt Strike ISFB WastedLocker |
2020-06-02 ⋅ Fox-IT ⋅ In-depth analysis of the new Team9 malware family BazarBackdoor |
2020-06-02 ⋅ NCC Group ⋅ In-depth analysis of the new Team9 malware family BazarBackdoor |
2018-05-18 ⋅ NCC Group ⋅ Emissary Panda – A potential new malicious tool HttpBrowser |
2018-04-20 ⋅ NCC Group ⋅ Decoding network data from a Gh0st RAT variant Ghost RAT APT27 |
2018-04-17 ⋅ NCC Group ⋅ Decoding network data from a Gh0st RAT variant Ghost RAT APT27 |