Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-08-16Trend MicroByron Gelera, Cris Tomboc, Jayson Chong, Jett Paulo Bernardo, Mark Marti, Nikki Madayag, Sean Torre
LockBit Resurfaces With Version 2.0 Ransomware Detections in Chile, Italy, Taiwan, UK
LockBit
2021-08-10Trend MicroDon Ovid Ladores, Monte de Jesus
Chaos Ransomware: A Proof of Concept With Potentially Dangerous Applications
Chaos
2021-08-09Trend MicroJaromír Hořejší, Joseph C. Chen
Cinobi Banking Trojan Targets Cryptocurrency Exchange Users via Malvertising
Cinobi
2021-08-04Trend MicroJanus Agcaoili, Jessie Prevost, Joelson Soares, Ryan Maglaque
Supply Chain Attacks from a Managed Detection and Response Perspective
REvil
2021-07-27Trend MicroAlfredo Oliveira, David Fiser
Threat Actors Exploit Misconfigured Apache Hadoop YARN
Kinsing
2021-07-22Trend MicroKatsuyuki Okamoto
Analysis of "[Urgent] Damage report regarding the occurrence of cyber attacks, etc. associated with the Tokyo Olympics.exe"
VIGILANT CLEANER
2021-07-22Trend MicroMickey Jin, Steven Du
Updated XCSSET Malware Targets Telegram, Other Apps
XCSSET
2021-07-21Trend MicroFyodor Yarochkin, Steven Du, Zhengyu Dong
StrongPity APT Group Deploys Android Malware for the First Time
2021-07-20Trend MicroAlfredo Oliveira, David Fiser
Tracking the Activities of TeamTNT: A Closer Look at a Cloud-Focused Malicious Actor Group
TeamTNT
2021-07-07Trend MicroGloria Chen, Jaromír Hořejší, Joseph C Chen, Kenney Lu
BIOPASS RAT: New Malware Sniffs Victims via Live Streaming
BIOPASS Cobalt Strike Derusbi
2021-07-05Trend MicroAbraham Camba, Buddy Tancio, Catherine Loveria, Ryan Maglaque
Tracking Cobalt Strike: A Trend Micro Vision One Investigation
Cobalt Strike
2021-07-01Trend MicroWilliam Gamazo Sanchez
PurpleFox Using WPAD to Target Indonesian Users
PurpleFox
2021-06-28Trend MicroTrend Micro
Nefilim Ransomware Attack Through a MITRE Att&ck Lens
Nefilim
2021-06-22Trend MicroAriel Neimond Lazaro, Luis Magisa
NukeSped Copies Fileless Code From Bundlore, Leaves It Unused
Bundlore
2021-06-17Trend MicroAliakbar Zahravi
Bash Ransomware DarkRadiation Targets Red Hat- and Debian-based Linux Distributions
2021-06-15Trend MicroByron Gelera, Earle Earnshaw, Janus Agcaoili, Miguel Ang, Nikko Tamana
Ransomware Double Extortion and Beyond: REvil, Clop, and Conti
Clop Conti REvil
2021-06-08Trend MicroDavid Sancho, Feike Hacquebord, Fernando Mercês, Ian Kenefick, Mayra Fuentes, Robert McArdle, Stephen Hilt, Vladimir Kropotov
Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them
Nefilim
2021-06-02Trend MicroDaniel Lunghi
Taking Advantage of PE Metadata,or How To Complete your Favorite ThreatActor’s Sample Collection (Paper)
HyperSSL
2021-06-02Trend MicroDaniel Lunghi
Taking Advantage of PE Metadata, or How To Complete Your Favorite Threat Actor’s Sample Collection
HyperSSL
2021-05-28Trend MicroMina Nalim
DarkSide on Linux: Virtual Machines Targeted
DarkSide