Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-05-15StairwellThreat Research at Stairwell
Stairwell threat report: Black Basta overview and detection rules
Black Basta Black Basta
2024-02-02StairwellThreat Research at Stairwell
Proactive response: AnyDesk, any breach
Agent Tesla
2024-01-31StairwellAlex Hegyi, Chris St. Myers, Evelyne Diaz Araque, Matt Richard, Silas Cutler, Vincent Zell
Technical analysis: The silent torrent of VileRAT
VileRAT EVILNUM
2023-12-13StairwellSilas Cutler
Kuiper ransomware analysis: Stairwell’s technical report
2023-08-23StairwellSilas Cutler
Akira: Pulling on the chains of ransomware
Akira
2022-07-06StairwellSilas Cutler
Maui Ransomware
Maui Ransomware
2022-04-27StairwellSilas Cutler, Steve Miller
The origin story of APT32 macros: The StrikeSuit Gi
StrikeSuit Gift
2022-04-27StairwellSilas Cutler, Steve Miller
The origin story of APT32 macros: The StrikeSuit Gift that keeps giving
2022-04-21StairwellSilas Cutler
The ink-stained trail of GOLDBACKDOOR
GOLDBACKDOOR
2022-02-28StairwellSteve Miller
Quick n’ dirty detection research: Building a labeled malware corpus for YARA testing
2022-01-18StairwellSilas Cutler
Whispers in the noise
WhisperGate