Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-06-18Cisco TalosVanja Svajcer
Famous Chollima deploying Python version of GolangGhost RAT
GolangGhost PylangGhost GolangGhost
2025-06-18Check Point ResearchAntonis Terefos, Jaromír Hořejší
Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data
2025-06-18ElasticSalim Bitam
A Wretch Client: From ClickFix deception to information stealer deployment
HijackLoader Lumma Stealer SectopRAT
2025-06-18Huntress LabsAlden Schmidt, Jonathan Semon, Stuart Ashenbrenner
Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion
2025-06-17Palo Alto Networks Unit 42Dominik Reichel
Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementation
KimJongRat
2025-06-17DARKReadingJames Shank
Operation Endgame: Do Takedowns and Arrests Matter?
BumbleBee Emotet Pikabot SmokeLoader TrickBot
2025-06-16ProofpointJeremy Hedges, Proofpoint Threat Research Team, Tommy Madjar
Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication
ACR Stealer Amatera
2025-06-16HarfangLabHarfangLab CTR
SadFuture: Mapping XDSpy latest evolution
XDSpy
2025-06-16Trend MicroAira Marcelo, Gabriel Nicoleta, Jovit Samaniego, Mohamed Fahmy
Clone, Compile, Compromise: Water Curse’s Open-Source Malware Trap on GitHub
2025-06-14abuse.chabuse.ch
MalwareBazaar | SalatStealer
SalatStealer
2025-06-13Recorded FutureRecorded Future
GrayAlpha Uses Diverse Infection Vectors to Deploy PowerNet Loader and NetSupport RAT
PowerNet
2025-06-13Twitter (@Unit42_Intel)Unit 42
Tweet about APT27 SysUpdate activity
HyperSSL HyperSSL
2025-06-13Recorded FutureInsikt Group
GrayAlpha Uses Diverse Infection Vectors to Deploy PowerNet Loader and NetSupport RAT
EugenLoader POWERTRASH NetSupportManager RAT
2025-06-12AikidoCharlie Eriksen
A deeper look into the threat actor behind the react-native-aria attack
JADESNOW
2025-06-12Check Point ResearchCheck Point
From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery
AsyncRAT Skuld
2025-06-12InfobloxInfoblox Threat Intelligence Group
Vexing and Vicious: The Eerie Relationship between WordPress Hackers and an Adtech Cabal
DollyWay
2025-06-12CitizenLabBill Marczak, John Scott-Railton
Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted
2025-06-12SymantecCarbon Black, Threat Hunter Team
Fog Ransomware: Unusual Toolset Used in Recent Attack
Fog
2025-06-12cocomelonccocomelonc
MacOS hacking part 1: stealing data via legit Telegram API. Simple C example
2025-06-10Twitter (@threatinsight)Threat Insight
Tweet regarding Aurotun / MonsterV2
MonsterV2