Click here to download all references as Bib-File.•
| 2022-05-04
⋅
F-Secure
⋅
Scheduled Task Tampering |
| 2021-05-10
⋅
F-Secure
⋅
Prelude to Ransomware: SystemBC SystemBC |
| 2021-04-09
⋅
F-Secure
⋅
Detecting Exposed Cobalt Strike DNS Redirectors Cobalt Strike |
| 2021-03-30
⋅
F-Secure
⋅
Attack landscape update: Ransomware 2.0, automated recon, and supply chain attacks |
| 2020-11-20
⋅
F-Secure Labs
⋅
Detecting Cobalt Strike Default Modules via Named Pipe Analysis Cobalt Strike |
| 2020-10-23
⋅
F-Secure Labs
⋅
Catching Lazarus: Threat Intelligence to Real Detection Logic - Part Two MimiKatz |
| 2020-10-20
⋅
F-Secure
⋅
Incident Readiness: Preparing a proactive response to attacks MimiKatz |
| 2020-09-25
⋅
F-Secure Labs
⋅
Catching Lazarus: Threat Intelligence to Real Detection Logic - Part One |
| 2020-08-18
⋅
F-Secure
⋅
Lazarus Group Campaign Targeting the Cryptocurrency Vertical |
| 2020-08-18
⋅
F-Secure Labs
⋅
Lazarus Group: Campaign Targeting the Cryptocurrency Vertical |
| 2020-07-16
⋅
F-Secure
⋅
US, UK, and Canada’s COVID-19 research targeted by APT29 |
| 2020-07-03
⋅
F-Secure Labs
⋅
Attack Detection Fundamentals: Code Execution and Persistence - Lab #1 Astaroth |
| 2020-05-06
⋅
F-Secure Labs
⋅
039| Deconstructing the Dukes: A Researcher’s Retrospective of APT29 OnionDuke |
| 2019-04-17
⋅
Malware Reversing Blog
⋅
The Dukes: 7 Years Of Russian Cyber-Espionage TwoFace BONDUPDATER DNSpionage |
| 2019-03-29
⋅
F-Secure
⋅
A Hammer Lurking In The Shadows shadowhammer |
| 2019-03-28
⋅
F-Secure
⋅
Analysis of ShadowHammer ASUS Attack First Stage Payload shadowhammer |
| 2017-10-27
⋅
F-Secure
⋅
The big difference with Bad Rabbit EternalPetya |
| 2017-04-13
⋅
F-Secure
⋅
Callisto Group Callisto |
| 2017-04-01
⋅
F-Secure
⋅
CALLISTO GROUP RCS Callisto |
| 2016-08-05
⋅
F-Secure
⋅
NANHAISHU: RATing the South China Sea NanHaiShu |