Click here to download all references as Bib-File.•
| 2021-03-21
⋅
Twitter (@CyberRaiju)
⋅
Twitter Thread with analysis of .NET China Chopper CHINACHOPPER |
| 2021-03-15
⋅
Trustwave
⋅
HAFNIUM, China Chopper and ASP.NET Runtime CHINACHOPPER |
| 2021-03-15
⋅
Council on Foreign Relations
⋅
The Iran-Russia Cyber Agreement and U.S. Strategy in the Middle East |
| 2021-03-08
⋅
Palo Alto Networks Unit 42
⋅
Analyzing Attacks Against Microsoft Exchange Server With China Chopper Webshells CHINACHOPPER |
| 2021-02-23
⋅
Medium (Katie’s Five Cents)
⋅
A Cyber Threat Intelligence Self-Study Plan: Part 1 |
| 2021-02-18
⋅
Bitdefender
⋅
Iranian APT Makes a Comeback with “Thunder and Lightning” Backdoor and Espionage Combo Infy Tonnerre |
| 2021-02-17
⋅
Palo Alto Networks Unit 42
⋅
WatchDog: Exposing a Cryptojacking Campaign That’s Operated for Two Years |
| 2021-02-16
⋅
SophosLabs Uncut
⋅
A Conti ransomware attack day-by-day Conti |
| 2021-02-10
⋅
360 netlab
⋅
Rinfo Is Making A Comeback and Is Scanning and Mining in Full Speed |
| 2021-02-09
⋅
Trend Micro
⋅
Threat actors now target Docker via container escape features |
| 2021-02-08
⋅
Wired
⋅
A Hacker Tried to Poison a Florida City's Water Supply, Officials Say |
| 2021-02-02
⋅
ESET Research
⋅
Kobalos – A complex Linux threat to high performance computing infrastructure Kobalos |
| 2021-02-01
⋅
Dancho Danchev's Blog
⋅
Profiling a Currently Active High-Profile Cybercriminals Portfolio of Ransomware-Themed Extortion Email Addresses - Part Two |
| 2021-02-01
⋅
pkb1s.github.io
⋅
Relay Attacks via Cobalt Strike Beacons Cobalt Strike |
| 2021-01-29
⋅
Aon
⋅
Cloudy with a Chance of Persistent Email Access SUNBURST |
| 2021-01-18
⋅
The DFIR Report
⋅
All That for a Coinminer? Coinminer Monero Miner |
| 2021-01-16
⋅
Medium
⋅
Oski Stealer : A Credential Theft Malware Oski Stealer |
| 2021-01-13
⋅
Intezer
⋅
A Rare Look Inside a Cryptojacking Campaign and its Profit |
| 2021-01-13
⋅
Bitdefender
⋅
Remcos RAT Revisited: A Colombian Coronavirus-Themed Campaign Remcos |
| 2021-01-04
⋅
SentinelOne
⋅
Building a Custom Malware Analysis Lab Environment TrickBot |