Click here to download all references as Bib-File.•
2021-01-26
⋅
Medium cycrafttechnology
⋅
Threat Attribution — Chimera "Under the Radar" |
2021-01-26
⋅
Medium s2wlab
⋅
W4 Jan | EN | Story of the week: Ransomware on the Darkweb Avaddon Babuk LockBit |
2021-01-26
⋅
Medium 0xthreatintel
⋅
Reversing APT Tool : SManager (Unpacked) SManager |
2021-01-25
⋅
Medium CSIS Techblog
⋅
The Nemty affiliate model Nemty |
2021-01-24
⋅
Medium vrieshd
⋅
Finding SUNBURST victims and targets by using passive DNS, OSINT SUNBURST |
2021-01-24
⋅
Medium nasbench
⋅
Common Tools & Techniques Used By Threat Actors and Malware — Part I |
2021-01-21
⋅
Medium CSIS Techblog
⋅
Silencing Microsoft Defender for Endpoint using firewall rules |
2021-01-20
⋅
Medium walmartglobaltech
⋅
Anchor and Lazarus together again? Anchor TrickBot |
2021-01-19
⋅
Medium validhorizon
⋅
Oh, So You Got IOCs? Being a Good CTI Consumer |
2021-01-19
⋅
Medium elis531989
⋅
Funtastic Packers And Where To Find Them Get2 IcedID QakBot |
2021-01-18
⋅
Medium csis-techblog
⋅
GCleaner — Garbage Provider Since 2019 Amadey Ficker Stealer Raccoon RedLine Stealer SmokeLoader STOP |
2021-01-16
⋅
Medium
⋅
Oski Stealer : A Credential Theft Malware Oski Stealer |
2021-01-16
⋅
Medium christiaanbeek
⋅
VHD Forensics — the sequel |
2021-01-15
⋅
Medium Dansec
⋅
Detecting Malicious C2 Activity -SpawnAs & SMB Lateral Movement in CobaltStrike Cobalt Strike |
2021-01-13
⋅
Medium Coinmonks
⋅
Passive Income of Cyber Criminals: Dissecting Bitcoin Multiplier Scam Magniber |
2021-01-12
⋅
Medium walmartglobaltech
⋅
De-ofuscating GoLang Functions |
2021-01-10
⋅
Medium walmartglobaltech
⋅
MAN1, Moskal, Hancitor and a side of Ransomware Cobalt Strike Hancitor SendSafe VegaLocker Moskalvzapoe |
2021-01-04
⋅
Medium haggis-m
⋅
Malleable C2 Profiles and You Cobalt Strike |
2020-12-26
⋅
Medium grimminck
⋅
Spoofing JARM signatures. I am the Cobalt Strike server now! Cobalt Strike |
2020-12-22
⋅
Medium mitre-attack
⋅
Identifying UNC2452-Related Techniques for ATT&CK SUNBURST TEARDROP UNC2452 |