Click here to download all references as Bib-File.•
| 2026-03-23
⋅
Netomize
⋅
Detect SnappyClient C&C Traffic Using PacketSmith + Yara-X Detection Module SnappyClient |
| 2026-03-20
⋅
Nextron Systems
⋅
RegPhantom Backdoor Threat Analysis RegPhantom |
| 2026-02-19
⋅
Elastic
⋅
MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites AstarionRAT |
| 2026-02-17
⋅
Google
⋅
From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day BRICKSTORM GRIMBOLT SLAYSTYLE UNC6201 |
| 2026-02-04
⋅
safebreach
⋅
Prince of Persia, Part II: Covering Tracks, Striking Back & a Revealing Link to the Iranian Regime Amid the Country’s Internet Blackout Infy StormKittyRAT |
| 2026-01-28
⋅
Accenture
⋅
Analysis of RustyRocket – A Custom WorldLeaks Exfiltration Tool RustyRocket |
| 2025-12-18
⋅
safebreach
⋅
Prince of Persia: A decade of Iranian Nation State APT Campaign Activity Infy Tonnerre |
| 2025-12-08
⋅
Trend Micro
⋅
AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows GhostPenguin |
| 2025-11-19
⋅
Spamhaus
⋅
The anatomy of bulletproof hosting – past, present, future |
| 2025-10-22
⋅
SentinelOne
⋅
PhantomCaptcha | Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation Princess |
| 2025-10-15
⋅
Palo Alto Networks Unit 42
⋅
PhantomVAI Loader Delivers a Range of Infostealers Katz Stealer PhantomVAI |
| 2025-10-13
⋅
Proofpoint
⋅
When the monster bytes: tracking TA585 and its arsenal MonsterV2 |
| 2025-10-09
⋅
Red Canary
⋅
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon AMOS Odyssey Stealer Poseidon Stealer |
| 2025-09-30
⋅
Palo Alto Networks Unit 42
⋅
Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite NET-STAR |
| 2025-09-19
⋅
BlackPoint
⋅
KeyZero: A Custom PowerShell RAT |
| 2025-09-16
⋅
Sekoia
⋅
APT28 Operation Phantom Net Voxel BEARDSHELL GRUNT SLIMAGENT |
| 2025-09-09
⋅
Positive Technologies
⋅
Phantom pains: a large-scale cyberespionage campaign and a possible split within the PhantomCore APT group PhantomCore |
| 2025-09-03
⋅
Proofpoint
⋅
Not Safe for Work: Tracking and Investigating Stealerium and Phantom Infostealers Phantom Stealer |
| 2025-08-28
⋅
Defentive
⋅
The Phantom Threat: Inside UNC5518’s Invisible Empire of MetaStealer Operations MetaStealer |
| 2025-08-27
⋅
Defentive
⋅
Anatomy of a Real Phishing Attack: How Defentive Detected and Stopped It in Action |