Click here to download all references as Bib-File.•
2022-05-04
⋅
F-Secure
⋅
Scheduled Task Tampering |
2021-05-10
⋅
F-Secure
⋅
Prelude to Ransomware: SystemBC SystemBC |
2021-04-09
⋅
F-Secure
⋅
Detecting Exposed Cobalt Strike DNS Redirectors Cobalt Strike |
2021-03-30
⋅
F-Secure
⋅
Attack landscape update: Ransomware 2.0, automated recon, and supply chain attacks |
2020-11-20
⋅
F-Secure Labs
⋅
Detecting Cobalt Strike Default Modules via Named Pipe Analysis Cobalt Strike |
2020-10-23
⋅
F-Secure Labs
⋅
Catching Lazarus: Threat Intelligence to Real Detection Logic - Part Two MimiKatz |
2020-10-20
⋅
F-Secure
⋅
Incident Readiness: Preparing a proactive response to attacks MimiKatz |
2020-09-25
⋅
F-Secure Labs
⋅
Catching Lazarus: Threat Intelligence to Real Detection Logic - Part One |
2020-08-18
⋅
F-Secure
⋅
Lazarus Group Campaign Targeting the Cryptocurrency Vertical |
2020-08-18
⋅
F-Secure Labs
⋅
Lazarus Group: Campaign Targeting the Cryptocurrency Vertical |
2020-07-16
⋅
F-Secure
⋅
US, UK, and Canada’s COVID-19 research targeted by APT29 |
2020-07-03
⋅
F-Secure Labs
⋅
Attack Detection Fundamentals: Code Execution and Persistence - Lab #1 Astaroth |
2020-05-06
⋅
F-Secure Labs
⋅
039| Deconstructing the Dukes: A Researcher’s Retrospective of APT29 OnionDuke |
2019-04-17
⋅
Malware Reversing Blog
⋅
The Dukes: 7 Years Of Russian Cyber-Espionage TwoFace BONDUPDATER DNSpionage |
2019-03-29
⋅
F-Secure
⋅
A Hammer Lurking In The Shadows shadowhammer |
2019-03-28
⋅
F-Secure
⋅
Analysis of ShadowHammer ASUS Attack First Stage Payload shadowhammer |
2017-10-27
⋅
F-Secure
⋅
The big difference with Bad Rabbit EternalPetya |
2017-04-13
⋅
F-Secure
⋅
Callisto Group Callisto |
2017-04-01
⋅
F-Secure
⋅
CALLISTO GROUP RCS Callisto |
2016-08-05
⋅
F-Secure
⋅
NANHAISHU: RATing the South China Sea NanHaiShu |