Click here to download all references as Bib-File.•
2023-04-05
⋅
velociraptor
⋅
Automating Qakbot Decode At Scale QakBot |
2023-04-05
⋅
Outpost24
⋅
Everything you need to know about the LummaC2 Stealer: Leveraging IDA Python and Unicorn to deobfuscate Windows API Hashing Lumma Stealer |
2023-04-05
⋅
Medium Ilandu
⋅
PortDoor - APT Backdoor analysis ACBackdoor 8.t Dropper PortDoor |
2023-04-04
⋅
Team Cymru
⋅
A Blog with NoName Dosia |
2023-04-04
⋅
Symantec
⋅
Mantis: New Tooling Used in Attacks Against Palestinian Targets Arid Gopher Micropsia |
2023-04-04
⋅
Group-IB
⋅
The old way: BabLock, new ransomware quietly cruising around Europe, Middle East, and Asia Rorschach Ransomware |
2023-04-04
⋅
Cisco Talos
⋅
Typhon Reborn V2: Updated stealer features enhanced anti-analysis and evasion capabilities Typhon Stealer |
2023-04-04
⋅
Check Point Research
⋅
Rorschach – A New Sophisticated and Fast Ransomware Rorschach Ransomware |
2023-04-03
⋅
Mandiant
⋅
ALPHV Ransomware Affiliate Targets Vulnerable Backup Installations to Gain Initial Access LaZagne BlackCat MimiKatz |
2023-04-03
⋅
Twitter (@kucher1n)
⋅
Tweet on an alternative Guporam sample Gopuram |
2023-04-03
⋅
Kaspersky Labs
⋅
Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack Gopuram |
2023-04-03
⋅
Trellix
⋅
A Royal Analysis of Royal Ransom Royal Ransom |
2023-04-03
⋅
Youtube (MalwareAnalysisForHedgehogs)
⋅
Malware Analysis - 3CX SmoothOperator ffmpeg.dll with Binary Ninja 3CX Backdoor |
2023-04-03
⋅
The DFIR Report
⋅
Malicious ISO File Leads to Domain Wide Ransomware Cobalt Strike IcedID Mount Locker |
2023-04-02
⋅
OALabs
⋅
AresLoader Taking a closer look at this new loader AresLoader |
2023-04-01
⋅
Objective-See
⋅
Ironing out (the macOS) details of a Smooth Operator (Part II) 3CX Backdoor |
2023-04-01
⋅
Github (dodo-sec)
⋅
SmoothOperator 3CX Backdoor |
2023-03-31
⋅
malware.love
⋅
TrueBot Analysis Part III - Capabilities Silence |
2023-03-31
⋅
Group-IB
⋅
36gate: supply chain attack 3CX Backdoor |
2023-03-31
⋅
vmware
⋅
Investigating 3CX Desktop Application Attacks: What You Need to Know 3CX Backdoor |