Click here to download all references as Bib-File.
2023-03-28 ⋅ ThreatMon ⋅ Chinotto Backdoor Technical Analysis of the APT Reaper’s Powerful Weapon Chinotto |
2023-03-20 ⋅ ThreatMon ⋅ Cybergun: Technical Analysis of the Armageddon's Infostealer Pteranodon |
2023-03-13 ⋅ ThreatMon ⋅ Beyond Bullets and Bombs: An Examination of Armageddon Group’s Cyber Warfare Against Ukraine Unidentified 003 (Gamaredon Downloader) Unidentified VBS 005 (Telegram Loader) Unidentified VBS 006 (Telegram Loader) Pteranodon |
2023-03-02 ⋅ ThreatMon ⋅ Behind the Breaches: Mapping Threat Actors and Their CVE Exploits |
2023-02-16 ⋅ ThreatMon ⋅ APT SideCopy Targeting Indian Government Entities - Analysis of the new version of ReverseRAT Unidentified 005 (Sidecopy) ReverseRAT |
2023 ⋅ ThreatMon ⋅ The Rise of Dark Power: A Close Look at the Group and their Ransomware |
2023 ⋅ ThreatMon ⋅ From Slides to Threats: Transparent Tribe’s New Attack on Indian Government Entities Using Malicious PPT |
2023 ⋅ ThreatMon ⋅ Python's Dark Side When Crafting a Wallet Stealer Becomes Disturbingly Effortless |
2023 ⋅ ThreatMon ⋅ APT41's Attack Chain: Exe-LolBins Leads to Powershell Backdoor with Telegram C2 |
2023 ⋅ ThreatMon ⋅ RAT Goes Phishing: Dissecting the Stealthy Techniques of REM Phishing RAT |
2023 ⋅ ThreatMon ⋅ Threat Analysis: SharpPanda APT’s Attack Chain Targeting G20 Nations |
2023 ⋅ ThreatMon ⋅ Technical Analysis of RDPCredentialStealer: Uncovering Malware Targeting RDP Credentials with API Hooking |
2023 ⋅ ThreatMon ⋅ Solving the Puzzle: Reversing the New Stealer Jigsaw Jigsaw |
2023 ⋅ ThreatMon ⋅ Unmasking Stealer X1na: A Technical Analysis of the Latest Threat |
2023 ⋅ ThreatMon ⋅ Chaos Unleashed: a Technical Analysis of a Novel Ransomware Chaos |
2023 ⋅ ThreatMon ⋅ Zaraza Bot: The New Russian Credential Stealer |
2023 ⋅ ThreatMon ⋅ APT Blind Eagles Malware Arsenal Technical Analysis LimeRAT |
2023 ⋅ ThreatMon ⋅ NestJS Stealer: Unraveling the Inner Workings of a New Cybersecurity Menace |
2023 ⋅ ThreatMon ⋅ Unraveling the Complex Infection Chain: Analysis of the SideCopy APT's Attack Action RAT |
2023 ⋅ ThreatMon ⋅ Reverse Engineering RokRAT: A Closer Look at APT37’s Onedrive-Based Attack Vector RokRAT |