Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-02-16US Department of DefenseUS Department of Defense
The creation of the 2020 ComRATv4 illustration
Agent.BTZ
2021-01-28Department of Homeland SecurityDepartment of Justice
Emotet Botnet Disrupted in International Cyber Operation
Emotet
2021-01-27Department of JusticeDepartment of Justice
INDICTMENT of SEBASTIEN VACHON-DESJARDINS for using Netwalker ransomware to commit crime
Mailto
2021-01-27Department of JusticeDepartment of Justice
Department of Justice Launches Global Action Against NetWalker Ransomware
Mailto
2021-01-06Department of JusticeDepartment of Justice
Department of Justice Statement on Solarwinds Update
SUNBURST
2020-12-13FireEyeAlex Berry, Alex Pennino, Alyssa Rahman, Andrew Archer, Andrew Rector, Andrew Thompson, Barry Vengerik, Ben Read, Ben Withnell, Chris DiGiamo, Christopher Glyer, Dan Perez, Dileep Jallepalli, Doug Bienstock, Eric Scales, Evan Reese, Fred House, Glenn Edwards, Ian Ahl, Isif Ibrahima, Jay Smith, John Gorman, John Hultquist, Jon Leathery, Lennard Galang, Marcin Siedlarz, Matt Dunwoody, Matthew McWhirt, Michael Sikorski, Microsoft, Mike Burns, Nalani Fraiser, Nick Bennett, Nick Carr, Nick Hornick, Nick Richard, Nicole Oppenheim, Omer Baig, Ramin Nafisi, Sarah Jones, Scott Runnels, Stephen Eckels, Steve Miller, Steve Stone, William Ballenthin
Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
SUNBURST SUPERNOVA TEARDROP UNC2452
2020-12-13Department of Homeland SecurityDepartment of Homeland Security
Mitigate SolarWinds Orion Code Compromise
2020-12-03TelsyTelsy Research Team
When a false flagdoesn’t work: Exploring the digital-crimeunderground at campaign preparation stage
Agent Tesla
2020-11-16ESET ResearchAnton Cherepanov, Peter Kálnai
Lazarus supply‑chain attack in South Korea
BookCodes RAT Lazarus Group
2020-11-04US Department of JusticeUS Department of Justice
United States Seizes 27 Additional Domain Names Used by Iran’s Islamic Revolutionary Guard Corps to Further a Global, Covert Influence Campaign
2020-10-23U.S. Department of the TreasuryU.S. Department of the Treasury
Treasury Sanctions Russian Government Research Institution Connected to the Triton Malware
Triton
2020-10-22U.S. Department of the TreasuryU.S. Department of the Treasury
Treasury Sanctions Iranian Entities for Attempted Election Interference
2020-10-20Department of JusticeDepartment of Justice
Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace
2020-10-20F-SecureF-Secure Consulting
Incident Readiness: Preparing a proactive response to attacks
MimiKatz
2020-10-15Department of JusticeDepartment of Justice
Officials Announce International Operation Targeting Transnational Criminal Organization QQAAZZ that Provided Money Laundering Services to High-Level Cybercriminals
Dridex ISFB TrickBot
2020-10-07Department of JusticeDepartment of Justice
92 domain names that were unlawfully used by Iran’s Islamic Revolutionary Guard Corps (IRGC) to engage in a global disinformation campaign
2020-10-07Department of JusticeDepartment of Justice
United States Seizes Domain Names Used by Iran’s Islamic Revolutionary Guard Corps
2020-10-06Department of Homeland SecurityDepartment of Homeland Security
Homeland Threat Assessment October 2020
2020-09-18Trend MicroTrend Micro
U.S. Justice Department Charges APT41 Hackers over Global Cyberattacks
Cobalt Strike ColdLock SharPyShell
2020-09-17U.S. Department of the TreasuryU.S. Department of the Treasury
Counter Terrorism Designations; Iran/Cyber-related Designations