Click here to download all references as Bib-File.•
2023-08-10
⋅
Trustwave
⋅
Gootloader: Why your Legal Document Search May End in Misery GootLoader |
2022-12-08
⋅
Trustwave
⋅
Trojanized OneNote Document Leads to Formbook Malware Formbook |
2022-01-13
⋅
Trustwave
⋅
Decrypting Qakbot’s Encrypted Registry Keys QakBot |
2021-10-15
⋅
Trustwave
⋅
BlackByte Ransomware – Pt 2. Code Obfuscation Analysis |
2021-10-15
⋅
Trustwave
⋅
BlackByte Ransomware – Pt. 1 In-depth Analysis |
2021-07-07
⋅
Trustwave
⋅
Diving Deeper Into the Kaseya VSA Attack: REvil Returns and Other Hackers Are Riding Their Coattails Cobalt Strike REvil |
2021-05-04
⋅
Trustwave
⋅
Pingback: Backdoor At The End Of The ICMP Tunnel PingBack |
2021-02-12
⋅
Trustwave
⋅
The Many Roads Leading To Agent Tesla Agent Tesla |
2020-07-11
⋅
Trustwave
⋅
Injecting Magecart into Magento Global Config magecart |
2020-06-22
⋅
Trustwave
⋅
Pillowmint: FIN7’s Monkey Thief PILLOWMINT |
2020-03-26
⋅
SpiderLabs Blog
⋅
Would You Exchange Your Security for a Gift Card? Griffon |
2019-12-20
⋅
Trustwave
⋅
Undressing the REvil REvil |
2019-04-05
⋅
Trustwave
⋅
Spammed PNG file hides LokiBot Loki Password Stealer (PWS) |
2016-07-01
⋅
SpiderLabs Blog
⋅
How I Cracked a Keylogger and Ended Up in Someone's Inbox HawkEye Keylogger |
2015-09-23
⋅
SpiderLabs Blog
⋅
Quaverse RAT: Remote-Access-as-a-Service QRat |
2009-03-17
⋅
Marshal8e6
⋅
Gheg spambot Tofsee |