Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-05-19Trend MicroNitesh Surana, Jaromír Hořejší
@online{surana:20230519:rustbased:b317fcd, author = {Nitesh Surana and Jaromír Hořejší}, title = {{Rust-Based Info Stealers Abuse GitHub Codespaces}}, date = {2023-05-19}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/23/e/rust-based-info-stealers-abuse-github-codespaces.html}, language = {English}, urldate = {2023-06-01} } Rust-Based Info Stealers Abuse GitHub Codespaces
DeltaStealer
2022-09-12Trend MicroNitesh Surana
@online{surana:20220912:security:14e0203, author = {Nitesh Surana}, title = {{Security Breaks: TeamTNT’s DockerHub Credentials Leak}}, date = {2022-09-12}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/22/i/security-breaks-teamtnts-dockerhub-credentials-leak.html}, language = {English}, urldate = {2022-09-19} } Security Breaks: TeamTNT’s DockerHub Credentials Leak
2022-09-08Trend MicroNitesh Surana, David Fiser, Alfredo Oliveira
@online{surana:20220908:how:a5c5cf6, author = {Nitesh Surana and David Fiser and Alfredo Oliveira}, title = {{How Malicious Actors Abuse Native Linux Tools in Attacks}}, date = {2022-09-08}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/22/i/how-malicious-actors-abuse-native-linux-tools-in-their-attacks.html}, language = {English}, urldate = {2022-09-19} } How Malicious Actors Abuse Native Linux Tools in Attacks
2022-04-20Trend MicroNitesh Surana, Ashish Verma
@online{surana:20220420:analyzing:e777903, author = {Nitesh Surana and Ashish Verma}, title = {{Analyzing Attempts to Exploit the Spring4Shell Vulnerability CVE-2022-22965 to Deploy Cryptocurrency Miners}}, date = {2022-04-20}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/22/d/spring4shell-exploited-to-deploy-cryptocurrency-miners.html}, language = {English}, urldate = {2022-05-04} } Analyzing Attempts to Exploit the Spring4Shell Vulnerability CVE-2022-22965 to Deploy Cryptocurrency Miners
2022-04-08Trend MicroDeep Patel, Nitesh Surana, Ashish Verma
@online{patel:20220408:cve202222965:53968ea, author = {Deep Patel and Nitesh Surana and Ashish Verma}, title = {{CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware}}, date = {2022-04-08}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/22/d/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulner.html}, language = {English}, urldate = {2022-04-13} } CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware
Mirai
2021-12-03Trend MicroNitesh Surana
@online{surana:20211203:vulnerabilities:a406a52, author = {Nitesh Surana}, title = {{Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify}}, date = {2021-12-03}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/21/l/vulnerabilities-exploited-for-monero-mining-malware-delivered-via-gitHub-netlify.html}, language = {English}, urldate = {2021-12-07} } Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify
2021-04-16Trend MicroNitesh Surana
@online{surana:20210416:could:bb769ca, author = {Nitesh Surana}, title = {{Could the Microsoft Exchange breach be stopped?}}, date = {2021-04-16}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/21/d/could-the-microsoft-exchange-breach-be-stopped.html}, language = {English}, urldate = {2021-05-11} } Could the Microsoft Exchange breach be stopped?
CHINACHOPPER