Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-04Medium (@DCSO_CyTec)Denis Szadkowski, Johann Aydinbas, Maike Orlikowski, Paul van Ramesdonk
Unransomware: From Zero to Full Recovery in a Blink
Akira
2024-04-09DCSODCSO CyTec
XZ Backdoor: How to check if your systems are affected
xzbot
2024-03-19Medium (@DCSO_CyTec)DCSO CyTec
How Rogue ISPs Tamper With Geofeeds
2024-02-21DCSOJiro Minier, Johann Aydinbas, Kritika Roy, Olivia Hayward
To Russia With Love: Assessing a KONNI-Backdoored Suspected Russian Consular Software Installer
Konni
2024-01-30DCSODCSO CyTec
Reporting on Volt Typhoon’s “JDY” Botnet Administration Via Tor Sparks Questions
2023-09-19Medium (@DCSO_CyTec)Johann Aydinbas
#ShortAndMalicious — DarkGate
DarkGate
2023-05-17Medium (@DCSO_CyTec)Axel Wauer, Emilia Neuber, Jiro Minier, Johann Aydinbas, Kritika Roy
Andariel’s “Jupiter” malware and the case of the curious C2
Jupiter
2023-02-10DCSOAxel Wauer, Johann Aydinbas
#ShortAndMalicious — PikaBot and the Matanbuchus connection
Pikabot
2022-12-24Medium (@DCSO_CyTec)Denis Szadkowski, Hendrik Baecker, Jiro Minier, Johann Aydinbas
APT41 — The spy who failed to encrypt me
CHINACHOPPER
2022-11-16Medium (@DCSO_CyTec)Axel Wauer, Johann Aydinbas
HZ RAT goes China
HZ RAT
2022-11-08DCSOAxel Wauer, Johann Aydinbas
#ShortAndMalicious: StrelaStealer aims for mail credentials
StrelaStealer
2022-10-11Medium (@DCSO_CyTec)Axel Wauer, Denis Szadkowski, Johann Aydinbas
Tracking down Maggie
Maggie
2022-10-04Medium (@DCSO_CyTec)Axel Wauer, Johann Aydinbas
MSSQL, meet Maggie
Maggie
2022-05-23DCSOColin Murphy, Johann Aydinbas
A deal with the devil: Analysis of a recent Matanbuchus sample
Matanbuchus
2022-04-14Medium (@DCSO_CyTec)Axel Wauer, DCSO CyTec
404 — File still found
SideWinder
2020-01-16DCSODCSO
A Curious Case of CVE-2019-19781 Palware: remove_bds
NOTROBIN
2019-03-18DCSODCSO
Enterprise Malware-as-a-Service: Lazarus Group and the Evolution of Ransomware
Hermes
2019-03-14DCSODCSO
Pegasus/Buhtrap analysis of the malware stage based on the leaked source code
Buhtrap