Click here to download all references as Bib-File.•
2019-12-04
⋅
JPCERT/CC
⋅
How to Respond to Emotet Infection (FAQ) Emotet |
2019-10-10
⋅
FireEye
⋅
Mahalo FIN7: Responding to the Criminal Operators’ New Tools and Techniques BOOSTWRITE |
2019-10-06
⋅
Playhouse
⋅
Go under the hood: Eris Ransomware Eris |
2019-09-25
⋅
Cylance
⋅
PcShare Backdoor Attacks Targeting Windows Users with FakeNarrator Malware PcShare |
2019-09-18
⋅
SophosLabs Uncut
⋅
The WannaCry hangover WannaCryptor |
2019-09-17
⋅
SophosLabs
⋅
WannaCry Aftershock WannaCryptor |
2019-09-11
⋅
Secureworks
⋅
COBALT DICKENS Goes Back to School…Again Silent Librarian |
2019-05-20
⋅
Cisco
⋅
Recent MuddyWater-associated BlackWater campaign shows signs of new anti-detection techniques MuddyWater |
2019-03-14
⋅
Trustwave
⋅
Attacker Tracking Users Seeking Pakistani Passport scanbox |
2019-01-11
⋅
FireEye
⋅
A Nasty Trick: From Credential Theft Malware to Business Disruption Ryuk TrickBot GRIM SPIDER WIZARD SPIDER |
2018-11-29
⋅
QuoScient
⋅
Golden Chickens: Uncovering A Malware-as-a-Service (MaaS) Provider and Two New Threat Actors Using It GC01 GC02 |
2018-10-31
⋅
Kryptos Logic
⋅
Emotet Awakens With New Campaign of Mass Email Exfiltration Emotet |
2018-10-30
⋅
Kraken Cryptor Ransomware Gains Popularity Among Cybercriminals Kraken |
2018-10-30
⋅
McAfee
⋅
Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims Kraken |
2018-10-18
⋅
ESET Research
⋅
GREYENERGY: A successor to BlackEnergy Felixroot GreyEnergy |
2018-09-14
⋅
Bleeping Computer
⋅
Kraken Cryptor Ransomware Masquerading as SuperAntiSpyware Security Program Kraken |
2018-09-10
⋅
Trend Micro
⋅
A Closer Look at the Locky Poser, PyLocky Ransomware PyLocky |
2018-09-02
⋅
Möbius Strip Reverse Engineering
⋅
Weekend Project: A Custom IDA Loader Module For The Hidden Bee Malware Family Hidden Bee |
2018-08-24
⋅
CyberScoop
⋅
Cobalt Dickens threat group looks to be similar to indicted hackers |
2018-08-24
⋅
Secureworks
⋅
Back to School: COBALT DICKENS Targets Universities Silent Librarian |