Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-02TechtargetArielle Waldman
CrowdStrike cracks PartyTicket ransomware targeting Ukraine
PartyTicket
2022-03-02elDiarioCarlos del Castillo
Cybercrime bosses warn that they will "fight back" if Russia is hacked
Conti Ryuk
2022-03-02ZscalerBrett Stone-Gross, Dennis Schwarz
DanaBot Launches DDoS Attack Against the Ukrainian Ministry of Defense
DanaBot
2022-03-01ESET ResearchVladislav Hrčka
Under the hood of Wslink’s multilayered virtual machine
Wslink
2022-03-01ProofpointMichael Raggi, Proofpoint Threat Research Team, Zydeca Cass
Asylum Ambuscade: State Actor Uses Compromised Private Ukrainian Military Emails to Target European Governments and Refugee Movement
SunSeed
2022-03-01Kaspersky LabsKaspersky
Ransomware as a distraction
HermeticWiper PartyTicket
2022-03-01The Hacker NewsRavie Lakshmanan
Second New 'IsaacWiper' Data Wiper Targets Ukraine After Russian Invasion
IsaacWiper Sunglow Blizzard
2022-03-01CybereasonOhav Peri, Tom Fakterman
Cybereason vs. BlackCat Ransomware
BlackCat
2022-03-01Github (0xZuk0)Dipankar Lama
Malware Analysis Report: WannaCry Ransomware
WannaCryptor
2022-03-01Huntress LabsJohn Hammond
Targeted APT Activity: BABYSHARK Is Out for Blood
BabyShark
2022-03-01KasperskyGReAT
Elections GoRansom – a smoke screen for the HermeticWiper attack
PartyTicket
2022-03-01Medium whickey000Wade Hickey
How I Cracked CONTI Ransomware Group’s Leaked Source Code ZIP File
Conti
2022-03-01ESET ResearchESET Research
IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine
HermeticWiper IsaacWiper PartyTicket
2022-03-01CleafyCleafy
TeaBot is now spreading across the globe
Anatsa
2022-02-28Bleeping ComputerSergiu Gatlan
Meta: Ukrainian officials, military targeted by Ghostwriter hackers
Ghostwriter
2022-02-28MicrosoftMSRC Team
Cyber threat activity in Ukraine: analysis and resources
CaddyWiper DesertBlade DoubleZero HermeticWiper INDUSTROYER2 IsaacWiper PartyTicket WhisperGate DEV-0586
2022-02-28ReutersChristopher Bing
New Chinese hacking tool found, spurring U.S. warning to allies
Daxin
2022-02-28Cyber GeeksVlad Pasca
How to Analyze Malicious Documents – Case Study of an Attack Targeting Ukrainian Organization
2022-02-28TrellixTaylor Mullins
Trellix Global Defenders: Cyberattacks Targeting Ukraine and HermeticWiper Protections
HermeticWiper
2022-02-28TrellixTaylor Mullins
Trellix Global Defenders: Analysis and Protections for BlackByte Ransomware
BlackByte