Click here to download all references as Bib-File.•
2025-03-13
⋅
EclecticIQ
⋅
Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices Black Basta |
2025-03-11
⋅
Hunt.io
⋅
JSPSpy and ‘filebroser’: A Custom File Management Tool in Webshell Infrastructure |
2025-02-27
⋅
Palo Alto Networks Unit 42
⋅
Squidoor: Suspected Chinese Threat Actor’s Backdoor Targets Global Organizations FINALDRAFT FINALDRAFT |
2025-02-25
⋅
Sentinel LABS
⋅
Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition |
2025-02-15
⋅
⋅
Youtube (greenplan)
⋅
[BINARY REFINERY] (Emmenhtal) - Deobfuscation of a custom obfuscation algorithm Emmenhtal |
2025-02-13
⋅
Volexity
⋅
Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication |
2025-02-03
⋅
SentinelOne
⋅
macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed FlexibleFerret FriendlyFerret FrostyFerret |
2025-01-29
⋅
SecurityScorecard
⋅
Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign BeaverTail InvisibleFerret |
2025-01-27
⋅
SecurityScorecard
⋅
Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign |
2024-12-11
⋅
JPCERT/CC
⋅
Attack Exploiting Legitimate Service by APT-C-60 SpyGrace |
2024-12-10
⋅
cyble
⋅
Head Mare Group Intensifies Attacks on Russia with PhantomCore Backdoor PhantomCore Head Mare |
2024-12-04
⋅
Rapid7
⋅
Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware Black Basta Cobalt Strike DarkGate SystemBC Zloader |
2024-11-22
⋅
Volexity
⋅
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access APT28 |
2024-11-20
⋅
Cofense
⋅
Custom I2P RAT “I2Parcae” Delivered via Pornographic Customer Support Form Spam I2PRAT Unidentified 118 |
2024-11-10
⋅
DFIR.ch
⋅
Reptile's Custom Kernel-Module Launcher reptile |
2024-10-19
⋅
Emanuele De Lucia on Security
⋅
“Hey ESET, Wait for the Leak”: Dissecting the “OctoberSeventh” Wiper targeting ESET customers in Israel OctoberSeventh |
2024-10-17
⋅
Sekoia
⋅
ClickFix tactic: The Phantom Meet Rhadamanthys Stealc |
2024-10-08
⋅
Trustwave
⋅
Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader Pronsis Loader Latrodectus Lumma Stealer |
2024-09-12
⋅
Cado Security
⋅
From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking perfctl |
2024-08-30
⋅
Denwp Research
⋅
Anatomy of a Lumma Stealer Attack via Fake CAPTCHA Pages - Part 1 Lumma Stealer |