Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-12-05ProofpointGreg Lesnewich, Crista Giering, Proofpoint Threat Research Team
@online{lesnewich:20231205:ta422s:a757704, author = {Greg Lesnewich and Crista Giering and Proofpoint Threat Research Team}, title = {{TA422’s Dedicated Exploitation Loop—the Same Week After Week}}, date = {2023-12-05}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/blog/threat-insight/ta422s-dedicated-exploitation-loop-same-week-after-week}, language = {English}, urldate = {2023-12-05} } TA422’s Dedicated Exploitation Loop—the Same Week After Week
2023-11-30BlackberryBlackBerry Research & Intelligence Team, Dmitry Bestuzhev
@online{team:20231130:aeroblade:725b5e6, author = {BlackBerry Research & Intelligence Team and Dmitry Bestuzhev}, title = {{AeroBlade on the Hunt Targeting the U.S. Aerospace Industry}}, date = {2023-11-30}, organization = {Blackberry}, url = {https://blogs.blackberry.com/en/2023/11/aeroblade-on-the-hunt-targeting-us-aerospace-industry}, language = {English}, urldate = {2023-12-05} } AeroBlade on the Hunt Targeting the U.S. Aerospace Industry
2023-10-26Avast DecodedThreat Research Team
@online{team:20231026:rhysida:08ca4b6, author = {Threat Research Team}, title = {{Rhysida Ransomware Technical Analysis}}, date = {2023-10-26}, organization = {Avast Decoded}, url = {https://decoded.avast.io/threatresearch/rhysida-ransomware-technical-analysis/}, language = {English}, urldate = {2023-10-30} } Rhysida Ransomware Technical Analysis
Rhysida
2023-10-16SekoiaThreat & Detection Research Team, sekoia
@online{team:20231016:clearfake:79236a9, author = {Threat & Detection Research Team and sekoia}, title = {{ClearFake: a newcomer to the “fake updates” threats landscape}}, date = {2023-10-16}, organization = {Sekoia}, url = {https://blog.sekoia.io/clearfake-a-newcomer-to-the-fake-updates-threats-landscape/}, language = {English}, urldate = {2023-10-17} } ClearFake: a newcomer to the “fake updates” threats landscape
ClearFake
2023-09-20ProofpointProofpoint Threat Research Team
@online{team:20230920:chinese:25abe7e, author = {Proofpoint Threat Research Team}, title = {{Chinese Malware Appears in Earnest Across Cybercrime Threat Landscape}}, date = {2023-09-20}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/blog/threat-insight/chinese-malware-appears-earnest-across-cybercrime-threat-landscape}, language = {English}, urldate = {2023-09-22} } Chinese Malware Appears in Earnest Across Cybercrime Threat Landscape
FatalRat PurpleFox ValleyRAT
2023-08-07Team CymruS2 Research Team
@online{team:20230807:visualizing:c79bb11, author = {S2 Research Team}, title = {{Visualizing Qakbot Infrastructure Part II: Uncharted Territory}}, date = {2023-08-07}, organization = {Team Cymru}, url = {https://www.team-cymru.com/post/visualizing-qakbot-infrastructure-part-ii-uncharted-territory}, language = {English}, urldate = {2023-08-07} } Visualizing Qakbot Infrastructure Part II: Uncharted Territory
QakBot
2023-07-28Team CymruS2 Research Team
@online{team:20230728:inside:f66ed7d, author = {S2 Research Team}, title = {{Inside the IcedID BackConnect Protocol (Part 2)}}, date = {2023-07-28}, organization = {Team Cymru}, url = {https://www.team-cymru.com/post/inside-the-icedid-backconnect-protocol-part-2}, language = {English}, urldate = {2023-07-31} } Inside the IcedID BackConnect Protocol (Part 2)
IcedID
2023-07-25splunkSplunk Threat Research Team
@online{team:20230725:amadey:cbe9d5b, author = {Splunk Threat Research Team}, title = {{Amadey Threat Analysis and Detections}}, date = {2023-07-25}, organization = {splunk}, url = {https://www.splunk.com/en_us/blog/security/amadey-threat-analysis-and-detections.html}, language = {English}, urldate = {2023-07-27} } Amadey Threat Analysis and Detections
Amadey
2023-07-08BlackberryBlackBerry Research & Intelligence Team
@online{team:20230708:romcom:4c7d096, author = {BlackBerry Research & Intelligence Team}, title = {{RomCom Threat Actor Suspected of Targeting Ukraine's NATO Membership Talks at the NATO Summit}}, date = {2023-07-08}, organization = {Blackberry}, url = {https://blogs.blackberry.com/en/2023/07/romcom-targets-ukraine-nato-membership-talks-at-nato-summit}, language = {English}, urldate = {2023-07-10} } RomCom Threat Actor Suspected of Targeting Ukraine's NATO Membership Talks at the NATO Summit
ROMCOM RAT
2023-06-29Avast DecodedThreat Research Team
@online{team:20230629:decrypted:9d80eb8, author = {Threat Research Team}, title = {{Decrypted: Akira Ransomware}}, date = {2023-06-29}, organization = {Avast Decoded}, url = {https://decoded.avast.io/threatresearch/decrypted-akira-ransomware/}, language = {English}, urldate = {2023-07-02} } Decrypted: Akira Ransomware
Akira
2023-06-28BI. ZONE Cyber Threats Research TeamOleg Skulkin
@online{skulkin:20230628:red:8e17932, author = {Oleg Skulkin}, title = {{Red Wolf is back to spy on commercial firms Red Wolf is back to spy on commercial firms}}, date = {2023-06-28}, organization = {BI. ZONE Cyber Threats Research Team}, url = {https://bi.zone/eng/expertise/blog/red-wolf-vnov-shpionit-za-kommercheskimi-organizatsiyami/}, language = {English}, urldate = {2023-10-17} } Red Wolf is back to spy on commercial firms Red Wolf is back to spy on commercial firms
RedCurl
2023-06-23PhylumPhylum Research Team
@online{team:20230623:phylum:860e071, author = {Phylum Research Team}, title = {{Phylum Discovers Sophisticated Ongoing Attack on NPM}}, date = {2023-06-23}, organization = {Phylum}, url = {https://blog.phylum.io/sophisticated-ongoing-attack-discovered-on-npm/}, language = {English}, urldate = {2023-07-25} } Phylum Discovers Sophisticated Ongoing Attack on NPM
2023-06-21ElasticColson Wilhoit, Salim Bitam, Seth Goodwin, Andrew Pease, Ricardo Ungureanu
@online{wilhoit:20230621:initial:4eacdf5, author = {Colson Wilhoit and Salim Bitam and Seth Goodwin and Andrew Pease and Ricardo Ungureanu}, title = {{Initial research exposing JOKERSPY}}, date = {2023-06-21}, organization = {Elastic}, url = {https://www.elastic.co/security-labs/inital-research-of-jokerspy}, language = {English}, urldate = {2023-07-11} } Initial research exposing JOKERSPY
JokerSpy
2023-06-15Team CymruS2 Research Team
@online{team:20230615:darth:08c6db7, author = {S2 Research Team}, title = {{Darth Vidar: The Aesir Strike Back}}, date = {2023-06-15}, organization = {Team Cymru}, url = {https://www.team-cymru.com/post/darth-vidar-the-aesir-strike-back}, language = {English}, urldate = {2023-07-24} } Darth Vidar: The Aesir Strike Back
Vidar
2023-05-25cybleCyble, Cyble Research Labs
@online{cyble:20230525:invicta:d08499f, author = {Cyble and Cyble Research Labs}, title = {{Invicta Stealer Spreading Through Phony GoDaddy Refund Invoices}}, date = {2023-05-25}, organization = {cyble}, url = {https://blog.cyble.com/2023/05/25/invicta-stealer-spreading-through-phony-godaddy-refund-invoices/}, language = {English}, urldate = {2023-06-19} } Invicta Stealer Spreading Through Phony GoDaddy Refund Invoices
Invicta Stealer
2023-05-08BlackberryBlackBerry Research & Intelligence Team
@online{team:20230508:sidewinder:ab9205d, author = {BlackBerry Research & Intelligence Team}, title = {{SideWinder Uses Server-side Polymorphism to Attack Pakistan Government Officials — and Is Now Targeting Turkey}}, date = {2023-05-08}, organization = {Blackberry}, url = {https://blogs.blackberry.com/en/2023/05/sidewinder-uses-server-side-polymorphism-to-target-pakistan}, language = {English}, urldate = {2023-05-10} } SideWinder Uses Server-side Polymorphism to Attack Pakistan Government Officials — and Is Now Targeting Turkey
2023-04-19Team CymruS2 Research Team
@online{team:20230419:allakored:9832ba9, author = {S2 Research Team}, title = {{AllaKore(d) the SideCopy Train}}, date = {2023-04-19}, organization = {Team Cymru}, url = {https://www.team-cymru.com/post/allakore-d-the-sidecopy-train}, language = {English}, urldate = {2023-04-22} } AllaKore(d) the SideCopy Train
AllaKore
2023-04-04Team CymruTeam Cymru, S2 Research Team
@online{cymru:20230404:blog:94e7e30, author = {Team Cymru and S2 Research Team}, title = {{A Blog with NoName}}, date = {2023-04-04}, organization = {Team Cymru}, url = {https://www.team-cymru.com/post/a-blog-with-noname}, language = {English}, urldate = {2023-05-05} } A Blog with NoName
Dosia
2023-03-31BlackberryThe BlackBerry Research & Intelligence Team
@online{team:20230331:initial:6f10f80, author = {The BlackBerry Research & Intelligence Team}, title = {{Initial Implants and Network Analysis Suggest the 3CX Supply Chain Operation Goes Back to Fall 2022}}, date = {2023-03-31}, organization = {Blackberry}, url = {https://blogs.blackberry.com/en/2023/03/initial-implants-and-network-analysis-suggest-the-3cx-supply-chain-operation-goes-back-to-fall-2022}, language = {English}, urldate = {2023-04-02} } Initial Implants and Network Analysis Suggest the 3CX Supply Chain Operation Goes Back to Fall 2022
3CX Backdoor
2023-03-31splunkSplunk Threat Research Team
@online{team:20230331:splunk:38f1f9f, author = {Splunk Threat Research Team}, title = {{Splunk Insights: Investigating the 3CXDesktopApp Supply Chain Compromise}}, date = {2023-03-31}, organization = {splunk}, url = {https://www.splunk.com/en_us/blog/security/splunk-insights-investigating-the-3cxdesktopapp-supply-chain-compromise.html}, language = {English}, urldate = {2023-04-02} } Splunk Insights: Investigating the 3CXDesktopApp Supply Chain Compromise
3CX Backdoor