Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-20TrellixJambul Tologonov, John Fokker, Phuc Pham
Phobos: Stealthy Ransomware That Operated Under the Radar - Until Now
8Base CryptXXXX Dharma Phobos
2023-10-23SarlackLabJohn Faria
Advice For Catching a RedLine Stealer
RedLine Stealer
2023-03-07TrellixAlejandro Houspanossian, John Fokker, Mathanraj Thangaraju, Pham Duy Phuc, Raghav Kapoor
Qakbot Evolves to OneNote Malware Distribution
QakBot
2023-01-24TrellixDaksh Kapur, John Fokker, Robert Venal, Tomer Shloman
Cyberattacks Targeting Ukraine Increase 20-fold at End of 2022 Fueled by Russia-linked Gamaredon Activity
Andromeda Formbook Houdini Remcos
2022-08-30Medium the_abjuri5tJohn F
NanoCore RAT Hunting Guide
Nanocore RAT
2022-03-31TrellixJambul Tologonov, John Fokker
Conti Leaks: Examining the Panama Papers of Ransomware
LockBit Amadey Buer Conti IcedID LockBit Mailto Maze PhotoLoader Ryuk TrickBot
2022-03-21IEEEAndreas Amann, John Fokker, Pierce Ryan, Sorcha Healy
Dynamics of Targeted Ransomware Negotiation
2022-03-17TrellixJohn Fokker, Thibault Seret
Suspected DarkHotel APT activity update
RMOT
2021-11-07McAfeeJohn Fokker, Raj Samani
Who Will Bend the Knee in RaaS Game of Thrones in 2022?
2021-09-08McAfeeJohn Fokker, Max Kersten, Thibault Seret
How Groove Gang is Shaking up the Ransomware-as-a-Service Market to Empower Affiliates
Babuk BlackMatter Babuk BlackMatter CTB Locker
2021-02-24McAfeeAlexandre Mundo, John Fokker, Thibault Seret, Thomas Roccia
Technical Analysis of Babuk Ransomware
Babuk
2020-07-01VMRayJohn Faria
Threat Bulletin: Cutting-off the Command-and-Control Infrastructure of CollectorGoomba
CollectorGoomba
2020-07-01VMRayJohn Faria
Threat Bulletin: Cutting-off the Command-and-Control Infrastructure of CollectorGoomba
2020-06-18Medium Huntress LabsJohn Ferrell
Hiding In Plain Sight
2019-11-01Virus BulletinAlexandre Mundo Alguacil, John Fokker
VB2019 paper: Different ways to cook a crab: GandCrab ransomware-as-a-service (RaaS) analysed in depth
Gandcrab
2019-01-09McAfeeChristiaan Beek, John Fokker
Ryuk Ransomware Attack: Rush to Attribution Misses the Point
Ryuk
2018-10-30Alexander Solad, Daniel Hatheway, John Fokker, Marc Rivero López
Kraken Cryptor Ransomware Gains Popularity Among Cybercriminals
Kraken
2018-10-30McAfeeJohn Fokker, Marc Rivero López
Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims
Kraken