Click here to download all references as Bib-File.•
2022-05-06
⋅
CrowdStrike
⋅
macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis EvilQuest FlashBack Shlayer XCSSET |
2022-05-06
⋅
Twitter (@MsftSecIntel)
⋅
Twitter Thread on initial infeciton of SocGholish/ FAKEUPDATES campaigns lead to BLISTER Loader, CobaltStrike, Lockbit and followed by Hands On Keyboard activity FAKEUPDATES Blister Cobalt Strike LockBit |
2022-05-06
⋅
Palo Alto Networks Unit 42
⋅
Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding Cobalt Strike |
2022-05-06
⋅
⋅
LeMagIT
⋅
Ransomware: LockBit 3.0 Starts Using in Cyberattacks LockBit |
2022-05-05
⋅
Cisco Talos
⋅
Mustang Panda deploys a new wave of malware targeting Europe Cobalt Strike Meterpreter PlugX PUBLOAD |
2022-05-05
⋅
Suspicious Actor
⋅
Studying “Next Generation Malware” - NightHawk’s Attempt At Obfuscate and Sleep Nighthawk |
2022-05-05
⋅
DomainTools
⋅
A Sticky Situation Part 1: The Pervasive Nature of Credit Card Skimmers |
2022-05-05
⋅
BrightTALK (Mandiant)
⋅
The Sample: Beating the Malware Piñata Jaku |
2022-05-05
⋅
Github (muha2xmad)
⋅
Analysis of MS Word to drop Remcos RAT | VBA extraction and analysis | IoCs Remcos |
2022-05-05
⋅
Malwarebytes Labs
⋅
Nigerian Tesla: 419 scammer gone malware distributor unmasked Agent Tesla |
2022-05-05
⋅
Blackberry
⋅
Threat Thursday: ZingoStealer – The Cost of “Free” ZingoStealer |
2022-05-05
⋅
Trend Micro
⋅
NetDooka Framework Distributed via PrivateLoader Malware as Part of Pay-Per-Install Service NetDooka PrivateLoader |
2022-05-05
⋅
Intel 471
⋅
Cybercrime loves company: Conti cooperated with other ransomware gangs LockBit Maze RagnarLocker Ryuk |
2022-05-05
⋅
NCC Group
⋅
North Korea’s Lazarus: their initial access trade-craft using social media and social engineering LCPDot |
2022-05-04
⋅
Cyware
⋅
Chinese Naikon Group Back with New Espionage Attack APT30 Naikon |
2022-05-04
⋅
Cybereason
⋅
Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques PRIVATELOG Spyder STASHLOG Winnti |
2022-05-04
⋅
HP
⋅
Tips for Automating IOC Extraction from GootLoader, a Changing JavaScript Malware GootLoader |
2022-05-04
⋅
Cybereason
⋅
Operation CuckooBees: A Winnti Malware Arsenal Deep-Dive PRIVATELOG Spyder STASHLOG Winnti |
2022-05-04
⋅
CrowdStrike
⋅
Compromised Docker Honeypots Used for Pro-Ukrainian DoS Attack |
2022-05-04
⋅
Mandiant
⋅
Old Services, New Tricks: Cloud Metadata Abuse by UNC2903 WSO |