Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-01-18SentinelOneJim Walter
BlackCat Ransomware | Highly-Configurable, Rust-Driven RaaS On The Prowl For Victims
BlackCat
2022-01-18ESET ResearchFacundo Muñoz, Matías Porolli
DoNot Go! Do not respawn!
yty
2022-01-17forensicitguyTony Lambert
Emotet's Excel 4.0 Macros Dropping DLLs
Emotet
2022-01-17Twitter (@HuskyHacksMK)Matt | HuskyHacks
WhisperGate Wiper Malware Analysis Live Thread
WhisperGate
2022-01-16Github (wgpsec)wgpsec
CreateHiddenAccount
CreateHiddenAccount
2022-01-16forensicitguyTony Lambert
Analyzing a CACTUSTORCH HTA Leading to Cobalt Strike
CACTUSTORCH Cobalt Strike
2022-01-15MicrosoftTom Burt
Malware attacks targeting Ukraine government (DEV-0586)
WhisperGate
2022-01-15Huntress LabsTeam Huntress
Threat Advisory: VMware Horizon Servers Actively Being Hit With Cobalt Strike (by DEV-0401)
Cobalt Strike
2022-01-15MalwareBookReportsmuzi
BazarLoader - Back from Holiday Break
BazarBackdoor
2022-01-14Trend MicroBren Matthew Ebriega
Ransom.Win32.WHITERABBIT.YACAET
WhiteRabbit
2022-01-14Medium (Cryptax)Axelle Apvrille
Multidex trick to unpack Android/BianLian
BianLian
2022-01-14FSBFSB
Unlawful Activities of Members of an Organized Criminal Community were suppressed
REvil REvil
2022-01-14MandiantBryan Turner, Daniel Smith, Matthew McWhirt, Omar Toor
Proactive Preparation and Hardening to Protect Against Destructive Attacks
2022-01-14HPPatrick Schläpfer
How Attackers Use XLL Malware to Infect Systems
2022-01-13muha2xmadMuhammad Hasan Ali
Unpacking Remcos malware
Remcos
2022-01-13F5Dor Nizar, Roy Moshailov
FluBot’s Authors Employ Creative and Sophisticated Techniques to Achieve Their Goals in Version 5.0 and Beyond
FluBot
2022-01-13TrustwaveLloyd Macrohon, Rodel Mendrez
Decrypting Qakbot’s Encrypted Registry Keys
QakBot
2022-01-13Recorded FutureGEMINI
FIN7 Uses Flash Drives to Spread Remote Access Trojan
2022-01-13BlackberryThe BlackBerry Research & Intelligence Team
Threat Thursday: Jupyter Infostealer is a Master of Disguise
solarmarker
2022-01-12BleepingComputerIonut Ilascu
Hackers take over diplomat's email, target Russian deputy minister
Konni