Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-07-25HITBSecConfŁukasz Siewierski
Zen: A Complex Campaign of Harmful Android Apps
2020-07-08BitdefenderBogdan Botezatu, Janos Gergo Szeles
Kingminer –a Crypto-Jacking Botnet Under the Scope
Kingminer
2020-07-07Sentinel LABSJason Reaves
Breaking EvilQuest | Reversing A Custom macOS Ransomware File Encryption Routine
EvilQuest
2020-06-25ElasticDaniel Stepanic, Samir Bousseaden
A close look at the advanced techniques used in a Malaysian-focused APT campaign
DADSTACHE APT40
2020-06-18JuniperPaul Kimayong
COVID-19 and FMLA Campaigns used to install new IcedID banking malware
IcedID
2020-06-17SentinelOneMichael Myngerbayev
A Click from the Backyard | Analysis of CVE-2020-9332, a Vulnerable USB Redirection Software
2020-06-16MicrosoftMicrosoft Threat Protection Intelligence Team
Exploiting a crisis: How cybercriminals behaved during the outbreak
2020-06-15VMWare Carbon BlackA C
TAU Threat Analysis: Relations to Hakbit Ransomware
Hakbit
2020-06-15Amnesty InternationalAmnesty International
India: Human Rights Defenders Targeted by a Coordinated Spyware Operation
NetWire RC
2020-06-08VMWare Carbon BlackA C
TAU Threat Analysis: Hakbit Ransomware
Hakbit
2020-06-01LookoutApurva Kumar, Christoph Hebeisen, Kristin Del Rosso
Mobile APT SurveillanceCampaigns Targeting Uyghurs A collection of long-running Android tooling connected to a Chinese mAPT actor
CarbonSteal DoubleAgent GoldenEagle SilkBean
2020-05-18Palo Alto Networks Unit 42Asher Davila, Yang Ji
Eleethub: A Cryptocurrency Mining Botnet with Rootkit for Self-Hiding
PerlBot
2020-05-14Trend MicroMatthew Stewart
QNodeService: Node.js Trojan Spread via Covid-19 Lure
QNodeService
2020-05-13ESET ResearchIgnacio Sanmillan
Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks
Ramsay Retro
2020-05-12FireEyeJacob Thompson
Analyzing Dark Crystal RAT, a C# backdoor
DCRat
2020-05-06Medium Asuna AmawakaAsuna Amawaka
Shadows with a chance of BlackNix
BBSRAT BlackNix RAT
2020-04-30AnomaliJoakim Kennedy, Parthiban R, Rory Gould, Sara Moore
Anomali Suspects that China-Backed APT Pirate Panda May Be Seeking Access to Vietnam Government Data Center
2020-04-15Suraj Malhotra
How Analysing an AgentTesla Could Lead To Attackers Inbox - Part II
Agent Tesla
2020-04-14QianxinQi'anxin Threat Intelligence
The Lazarus APT organization uses the new crown epidemic bait to target a targeted attack analysis of a country
CRAT
2020-04-13Suraj Malhotra
How Analysing an AgentTesla Could Lead To Attackers Inbox - Part I
Agent Tesla