Click here to download all references as Bib-File.•
2023-10-03
⋅
Lighting the Exfiltration Infrastructure of a LockBit Affiliate (and more) LockBit LockBit Conti LockBit |
2023-04-17
⋅
B42 Labs
⋅
Data Insights from Russian Cyber Militants: NoName05716 Dosia |
2023-03-26
⋅
Updates from the MaaS: new threats delivered through NullMixer Fabookie Nullmixer PseudoManuscrypt Raccoon RedLine Stealer |
2023-03-12
⋅
Makop: The Toolkit of a Criminal Gang Makop Ransomware |
2023-02-17
⋅
Twitter (@luc4m)
⋅
Tweets about Darkbit's intermittent encryption DarkBit |
2022-03-08
⋅
Yoroi
⋅
Conti Ransomware source code: a well-designed COTS ransomware Conti |
2022-02-26
⋅
Yoroi
⋅
DiskKill/HermeticWiper, a disruptive cyber-weapon targeting Ukraine’s critical infrastructures HermeticWiper |
2021-12-17
⋅
Yoroi
⋅
Serverless InfoStealer delivered in Est European Countries Agent Tesla |
2021-11-16
⋅
Yoroi
⋅
Office Documents: May the XLL technique change the threat Landscape in 2022? Agent Tesla Dridex Formbook |
2021-10-01
⋅
Yoroi
⋅
Spectre v4.0: the speed of malware threats after the pandemics Spectre Rat |
2021-09-24
⋅
Yoroi
⋅
Hunting the LockBit Gang's Exfiltration Infrastructures LockBit StealBit |
2021-08-31
⋅
Yoroi
⋅
Financial Institutions in the Sight of New JsOutProx Attack Waves JSOutProx |
2021-06-29
⋅
Yoroi
⋅
The "WayBack” Campaign: a Large Scale Operation Hiding in Plain Sight Agent Tesla Cobian RAT Oski Stealer |
2021-04-16
⋅
Yoroi
⋅
Ransomware micro-criminals are still out here (and growing) |
2021-03-16
⋅
Yoroi
⋅
Threatening within Budget: How WSH-RAT is abused by Cyber-Crooks Houdini |
2021-02-04
⋅
Yoroi
⋅
Connecting the dots inside the Italian APT Landscape |
2021-01-12
⋅
Yoroi
⋅
Opening “STEELCORGI”: A Sophisticated APT Swiss Army Knife STEELCORGI |
2020-11-30
⋅
Yoroi
⋅
Shadows From The Past Threaten Italian Enterprises Rekoobe LaZagne Responder MimiKatz win.rekoobe |
2020-05-22
⋅
Yoroi
⋅
Cyber-Criminal espionage Operation insists on Italian Manufacturing Agent Tesla |
2020-05-06
⋅
Yoroi
⋅
New Cyber Operation Targets Italy: Digging Into the Netwire Attack Chain NetWire RC |