Click here to download all references as Bib-File.•
| 2025-10-07
            
            ⋅
            
            Aryaka Networks
            ⋅
            
             Vietnamese Threat Group Uses Vampire Bot to Target Digital Professionals Vampire Bot  | 
| 2025-07-25
            
            ⋅
            
            Aryaka Networks
            ⋅
            
             The Operational Blueprint of Kimsuky APT for Cyber Espionage Kimsuky  | 
| 2025-04-21
            
            ⋅
            
            Aryaka Networks
            ⋅
            
             Strela Stealer Malware Research: Tracing the Digital Footprint and Network Behavior StrelaStealer  | 
| 2025-03-06
            
            ⋅
            
            Aryaka Networks
            ⋅
            
             Snake Infostealer: A Look into Data Exfiltration via SMTP 404 Keylogger  | 
| 2023-10-12
            
            ⋅
            
            YouTube (FIRST)
            ⋅
            
             "Compromising the Keys to the Kingdom" - Exfiltrating Data to Own and Operate the Exploited Systems Loki RAT SystemBC  | 
| 2023-09-12
            
            ⋅
            
            FIRSTCON
            ⋅
            
             Compromising the Keys to the Kingdom: Exfiltrating Data to Own and Operate the Exploited Systems (Slides) Loki RAT SystemBC  | 
| 2022-08-15
            
            ⋅
            
            F5 Labs
            ⋅
            
             BlackGuard Infostealer Malware: Dissecting the State of Exfiltrated Data BlackGuard  | 
| 2022-04-23
            
            ⋅
            
            F5
            ⋅
            
             Cryptojacking on the Fly: TeamTNT Using NVIDIA Drivers to Mine Cryptocurrency  | 
| 2021-12-08
            
            ⋅
            
            F5
            ⋅
            
             Collector-stealer: a Russian origin credential and information extractor  | 
| 2021-04-07
            
            ⋅
            
            F5
            ⋅
            
             Dissecting the Design and Vulnerabilities in Azorult C&C Panels Azorult  | 
| 2020-02-14
            
            ⋅
            
            Virus Bulletin
            ⋅
            
             LokiBot: dissecting the C&C panel deployments Loki Password Stealer (PWS)  | 
| 2012-08-01
            
            ⋅
            
            Virus Bulletin
            ⋅
            
             Inside the ICE IX bot, descendent of Zeus Ice IX  |