Click here to download all references as Bib-File.•
2022-06-12
⋅
Confiant
⋅
How SeaFlower 藏海花 installs backdoors in iOS/Android web3 wallets to steal your seed phrase |
2021-10-18
⋅
Medium Confiant
⋅
Profiling hackers using the Malvertising Attack Matrix by Confiant |
2021-06-10
⋅
ZAYOTEM
⋅
LokiBot Technical Analysis Report LokiBot |
2021-04-24
⋅
Medium lordx64
⋅
Initial analysis of PasswordState supply chain attack backdoor code |
2021-03-13
⋅
YouTube (0xc7a)
⋅
DearCry Ransomware - A quick look 0x01 dearcry |
2021-03-13
⋅
YouTube (0xc7a)
⋅
DearCry Ransomware - A quick look 0x02 dearcry |
2021-03-13
⋅
YouTube (0xc7a)
⋅
DearCry Ransomware - A quick look 0x00 dearcry |
2020-12-14
⋅
Twitter (@lordx64)
⋅
Tweet on a one liner to decrypt SUNBURST backdoor SUNBURST |
2020-07-14
⋅
Confiant
⋅
Internet Explorer CVE-2019–1367 Exploitation — part 3 |
2020-07-13
⋅
Confiant
⋅
Internet Explorer CVE-2019–1367 Exploitation — part 1 |
2020-07-13
⋅
Confiant
⋅
Internet Explorer CVE-2019–1367 In the wild Exploitation - prelude |
2019-12-10
⋅
Confiant
⋅
New macOS Bundlore Loader Analysis Bundlore |
2019-04-08
⋅
SANS Cyber Security Summit
⋅
Trails of WindShift WindTail ZhMimikatz |
2018-01-01
⋅
DarkMatter
⋅
IN THE TRAILS OF WINDSHIFTAPT WindTail WindShift |
2016-04-13
⋅
FireEye
⋅
Ghosts in the Endpoint PLEAD |
2015-12-11
⋅
FireEye
⋅
LATENTBOT: Trace Me If You Can LatentBot |