Click here to download all references as Bib-File.•
2024-01-31
⋅
Stairwell
⋅
Technical analysis: The silent torrent of VileRAT VileRAT EVILNUM |
2023-12-13
⋅
Stairwell
⋅
Kuiper ransomware analysis: Stairwell’s technical report |
2023-08-23
⋅
Stairwell
⋅
Akira: Pulling on the chains of ransomware Akira |
2022-07-06
⋅
Stairwell
⋅
Maui Ransomware Maui Ransomware |
2022-04-27
⋅
Stairwell
⋅
The origin story of APT32 macros: The StrikeSuit Gi StrikeSuit Gift |
2022-04-27
⋅
Stairwell
⋅
The origin story of APT32 macros: The StrikeSuit Gift that keeps giving |
2022-04-21
⋅
Stairwell
⋅
The ink-stained trail of GOLDBACKDOOR GOLDBACKDOOR |
2022-04-14
⋅
Twitter (@silascutler)
⋅
Tweet on sample discovery for potential INCONTROLLER INCONTROLLER |
2022-04-12
⋅
Twitter (@silascutler)
⋅
Tweet on analysis of CADDYWIPER used alongside with INDUSTROYER2 CaddyWiper INDUSTROYER2 |
2022-03-09
⋅
Twitter (@silascutler)
⋅
Tweet on HermeticWizard's self-spreading mechanism HermeticWizard |
2022-01-18
⋅
Stairwell
⋅
Whispers in the noise WhisperGate |
2021-01-14
⋅
Silas Cutler's Blog
⋅
Killed In Translation |
2019-11-16
⋅
Silas Cutler's Blog
⋅
Fresh PlugX October 2019 PlugX |
2019-05-15
⋅
Chronicle
⋅
Winnti: More than just Windows and Gates Winnti APT41 |
2019-04-09
⋅
Chronicle Security
⋅
Flame 2.0: Risen from the Ashes Flame |
2019-04-09
⋅
Chronicle Security
⋅
The Oldest Stuxnet Component Dials Up FlowerShop Stuxnet |