Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-01-08ReaqtaReaQta Threat Intelligence Team
@online{team:20210108:leonardo:bf16884, author = {ReaQta Threat Intelligence Team}, title = {{Leonardo S.p.A. Data Breach Analysis}}, date = {2021-01-08}, organization = {Reaqta}, url = {https://reaqta.com/2021/01/fujinama-analysis-leonardo-spa/}, language = {English}, urldate = {2021-01-11} } Leonardo S.p.A. Data Breach Analysis
2020-06-19ReaqtaReaqta
@online{reaqta:20200619:dridex:54f4dd5, author = {Reaqta}, title = {{Dridex: the secret in a PostMessage()}}, date = {2020-06-19}, organization = {Reaqta}, url = {https://reaqta.com/2020/06/dridex-the-secret-in-a-postmessage/}, language = {English}, urldate = {2020-06-22} } Dridex: the secret in a PostMessage()
Dridex
2020-01-08ReaqtaReaqta
@online{reaqta:20200108:leonardo:af14272, author = {Reaqta}, title = {{Leonardo S.p.A. Data Breach Analysis}}, date = {2020-01-08}, organization = {Reaqta}, url = {https://reaqta.com/2021/01/fujinama-analysis-leonardo-spa}, language = {English}, urldate = {2021-06-16} } Leonardo S.p.A. Data Breach Analysis
win.fujinama
2019-04-11ReaqtaReaqta
@online{reaqta:20190411:avemaria:d6cd904, author = {Reaqta}, title = {{Ave_Maria Malware: there's more than meets the eye}}, date = {2019-04-11}, organization = {Reaqta}, url = {https://reaqta.com/2019/04/ave_maria-malware-part1/}, language = {English}, urldate = {2020-01-07} } Ave_Maria Malware: there's more than meets the eye
Ave Maria
2019-01-24ReaqtaReaqta
@online{reaqta:20190124:silence:08baddd, author = {Reaqta}, title = {{Silence group targeting Russian Banks via Malicious CHM}}, date = {2019-01-24}, organization = {Reaqta}, url = {https://reaqta.com/2019/01/silence-group-targeting-russian-banks/}, language = {English}, urldate = {2019-11-28} } Silence group targeting Russian Banks via Malicious CHM
Silence Silence group
2018-03-02ReaqtaReaqta
@online{reaqta:20180302:spearphishing:3d933a4, author = {Reaqta}, title = {{Spear-phishing campaign leveraging on MSXSL}}, date = {2018-03-02}, organization = {Reaqta}, url = {https://reaqta.com/2018/03/spear-phishing-campaign-leveraging-msxsl/}, language = {English}, urldate = {2020-01-08} } Spear-phishing campaign leveraging on MSXSL
More_eggs
2017-11-22ReaqtaReaqta
@online{reaqta:20171122:dive:5c67031, author = {Reaqta}, title = {{A dive into MuddyWater APT targeting Middle-East}}, date = {2017-11-22}, organization = {Reaqta}, url = {https://reaqta.com/2017/11/muddywater-apt-targeting-middle-east/}, language = {English}, urldate = {2020-01-08} } A dive into MuddyWater APT targeting Middle-East
POWERSTATS
2017-11-08ReaqtaReaqta
@online{reaqta:20171108:short:aa183af, author = {Reaqta}, title = {{A short journey into DarkVNC attack chain}}, date = {2017-11-08}, organization = {Reaqta}, url = {https://reaqta.com/2017/11/short-journey-darkvnc/}, language = {English}, urldate = {2022-04-20} } A short journey into DarkVNC attack chain
DarkVNC