Click here to download all references as Bib-File.•
2023-04-04
⋅
Check Point Research
⋅
Rorschach – A New Sophisticated and Fast Ransomware Rorschach Ransomware |
2023-04-03
⋅
Mandiant
⋅
ALPHV Ransomware Affiliate Targets Vulnerable Backup Installations to Gain Initial Access LaZagne BlackCat MimiKatz |
2023-04-03
⋅
Twitter (@kucher1n)
⋅
Tweet on an alternative Guporam sample Gopuram |
2023-04-03
⋅
Kaspersky Labs
⋅
Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack Gopuram |
2023-04-03
⋅
Trellix
⋅
A Royal Analysis of Royal Ransom Royal Ransom |
2023-04-03
⋅
Youtube (MalwareAnalysisForHedgehogs)
⋅
Malware Analysis - 3CX SmoothOperator ffmpeg.dll with Binary Ninja 3CX Backdoor |
2023-04-03
⋅
The DFIR Report
⋅
Malicious ISO File Leads to Domain Wide Ransomware Cobalt Strike IcedID Mount Locker |
2023-04-02
⋅
OALabs
⋅
AresLoader Taking a closer look at this new loader AresLoader |
2023-04-01
⋅
Objective-See
⋅
Ironing out (the macOS) details of a Smooth Operator (Part II) 3CX Backdoor |
2023-04-01
⋅
Github (dodo-sec)
⋅
SmoothOperator 3CX Backdoor |
2023-03-31
⋅
malware.love
⋅
TrueBot Analysis Part III - Capabilities Silence |
2023-03-31
⋅
Group-IB
⋅
36gate: supply chain attack 3CX Backdoor |
2023-03-31
⋅
vmware
⋅
Investigating 3CX Desktop Application Attacks: What You Need to Know 3CX Backdoor |
2023-03-31
⋅
Reversing Labs
⋅
Red flags flew over software supply chain-compromised 3CX update 3CX Backdoor |
2023-03-31
⋅
Blackberry
⋅
Initial Implants and Network Analysis Suggest the 3CX Supply Chain Operation Goes Back to Fall 2022 3CX Backdoor |
2023-03-31
⋅
cyble
⋅
A Comprehensive Analysis of the 3CX Attack 3CX Backdoor |
2023-03-31
⋅
splunk
⋅
Splunk Insights: Investigating the 3CXDesktopApp Supply Chain Compromise 3CX Backdoor |
2023-03-31
⋅
Zscaler
⋅
3CX Supply Chain Attack Campaign Campaign Analysis 3CX Backdoor |
2023-03-31
⋅
Youtube (ThreatCatch)
⋅
Sinkholing the Domain Generation Algorithm of m0yv Expiro m0yv |
2023-03-31
⋅
Telekom
⋅
Moqhao masters new tricks MoqHao |