Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-09-17SophosLabsPeter Mackenzie
WannaCry Aftershock
WannaCryptor
2019-09-11SecureworksCTU Research Team
COBALT DICKENS Goes Back to School…Again
Silent Librarian
2019-05-20CiscoDanny Adamitis, David Maynor, Kendall McKay
Recent MuddyWater-associated BlackWater campaign shows signs of new anti-detection techniques
MuddyWater
2019-03-14TrustwaveSimon Kenin
Attacker Tracking Users Seeking Pakistani Passport
scanbox
2019-01-11FireEyeChristopher Glyer, Jaideep Natu, Jeremy Kennelly, Kimberly Goody
A Nasty Trick: From Credential Theft Malware to Business Disruption
Ryuk TrickBot GRIM SPIDER WIZARD SPIDER
2018-11-29QuoScientQuoScient
Golden Chickens: Uncovering A Malware-as-a-Service (MaaS) Provider and Two New Threat Actors Using It
GC01 GC02
2018-10-31Kryptos LogicKryptos Logic
Emotet Awakens With New Campaign of Mass Email Exfiltration
Emotet
2018-10-30Alexander Solad, Daniel Hatheway, John Fokker, Marc Rivero López
Kraken Cryptor Ransomware Gains Popularity Among Cybercriminals
Kraken
2018-10-30Alexander Solad, Daniel Hatheway, John Fokker, Marc Rivero López
Kraken Cryptor Ransomware Gains Popularity Among Cybercriminals
Kraken
2018-10-30Alexander Solad, Daniel Hatheway, John Fokker, Marc Rivero López
Kraken Cryptor Ransomware Gains Popularity Among Cybercriminals
Kraken
2018-10-30Alexander Solad, Daniel Hatheway, John Fokker, Marc Rivero López
Kraken Cryptor Ransomware Gains Popularity Among Cybercriminals
Kraken
2018-10-30McAfeeJohn Fokker, Marc Rivero López
Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims
Kraken
2018-10-30McAfeeJohn Fokker, Marc Rivero López
Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims
Kraken
2018-10-18ESET ResearchAnton Cherepanov
GREYENERGY: A successor to BlackEnergy
Felixroot GreyEnergy
2018-09-14Bleeping ComputerLawrence Abrams
Kraken Cryptor Ransomware Masquerading as SuperAntiSpyware Security Program
Kraken
2018-09-10Trend MicroIan Kenefick
A Closer Look at the Locky Poser, PyLocky Ransomware
PyLocky
2018-09-02Möbius Strip Reverse EngineeringRolf Rolles
Weekend Project: A Custom IDA Loader Module For The Hidden Bee Malware Family
Hidden Bee
2018-08-24CyberScoopPatrick Howell O'Neill
Cobalt Dickens threat group looks to be similar to indicted hackers
2018-08-24SecureworksCTU Research Team
Back to School: COBALT DICKENS Targets Universities
Silent Librarian
2018-08-21Trend MicroJaromír Hořejší, Joseph C Chen, Kawabata Kohei, Kenney Lu
Operation Red Signature Targets South Korean Companies
9002 RAT PlugX Operation Red Signature