Click here to download all references as Bib-File.
2023-08-10 ⋅ Trustwave ⋅ Gootloader: Why your Legal Document Search May End in Misery GootLoader |
2022-12-08 ⋅ Trustwave ⋅ Trojanized OneNote Document Leads to Formbook Malware Formbook |
2022-01-13 ⋅ Trustwave ⋅ Decrypting Qakbot’s Encrypted Registry Keys QakBot |
2021-10-15 ⋅ Trustwave ⋅ BlackByte Ransomware – Pt. 1 In-depth Analysis |
2021-10-15 ⋅ Trustwave ⋅ BlackByte Ransomware – Pt 2. Code Obfuscation Analysis |
2021-07-07 ⋅ Trustwave ⋅ Diving Deeper Into the Kaseya VSA Attack: REvil Returns and Other Hackers Are Riding Their Coattails Cobalt Strike REvil |
2021-05-04 ⋅ Trustwave ⋅ Pingback: Backdoor At The End Of The ICMP Tunnel PingBack |
2021-02-12 ⋅ Trustwave ⋅ The Many Roads Leading To Agent Tesla Agent Tesla |
2020-07-11 ⋅ Trustwave ⋅ Injecting Magecart into Magento Global Config magecart |
2020-06-22 ⋅ Trustwave ⋅ Pillowmint: FIN7’s Monkey Thief PILLOWMINT |
2020-03-26 ⋅ SpiderLabs Blog ⋅ Would You Exchange Your Security for a Gift Card? Griffon |
2019-12-20 ⋅ Trustwave ⋅ Undressing the REvil REvil |
2019-04-05 ⋅ Trustwave ⋅ Spammed PNG file hides LokiBot Loki Password Stealer (PWS) |
2016-07-01 ⋅ SpiderLabs Blog ⋅ How I Cracked a Keylogger and Ended Up in Someone's Inbox HawkEye Keylogger |
2015-09-23 ⋅ SpiderLabs Blog ⋅ Quaverse RAT: Remote-Access-as-a-Service QRat |
2009-03-17 ⋅ Marshal8e6 ⋅ Gheg spambot Tofsee |