Click here to download all references as Bib-File.•
2022-10-28
⋅
Elastic
⋅
EMOTET dynamic config extraction Emotet |
2022-10-27
⋅
vmware
⋅
Threat Analysis: Active C2 Discovery Using Protocol Emulation Part3 (ShadowPad) ShadowPad |
2022-10-27
⋅
Microsoft
⋅
Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity FAKEUPDATES BumbleBee Clop Fauppod Raspberry Robin Roshtyak Silence DEV-0950 Mustard Tempest |
2022-10-27
⋅
Microsoft
⋅
Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity FAKEUPDATES BumbleBee Fauppod PhotoLoader Raspberry Robin Roshtyak |
2022-10-27
⋅
Bleeping Computer
⋅
Microsoft links Raspberry Robin worm to Clop ransomware attacks Clop Raspberry Robin |
2022-10-27
⋅
ANY.RUN
⋅
STRRAT: Malware Analysis of a JAR archive STRRAT |
2022-10-27
⋅
Bleeping Computer
⋅
Fodcha DDoS botnet reaches 1Tbps in power, injects ransoms in packets Fodcha |
2022-10-26
⋅
Flashpoint
⋅
Pro-Kremlin Hacktivist Groups Seeking Impact By Courting Notoriety RaHDit |
2022-10-26
⋅
Mandiant
⋅
Pro-PRC DRAGONBRIDGE Influence Campaign Leverages New TTPs to Aggressively Target U.S. Interests, Including Midterm Elections Dragonbridge |
2022-10-26
⋅
CrowdStrike
⋅
CrowdStrike Identifies New Kiss-a-Dog Cryptojacking Campaign Targeting Vulnerable Docker and Kubernetes Infrastructure xmrig Kiss-a-Dog |
2022-10-25
⋅
Microsoft
⋅
DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector BlackCat Mount Locker PortStarter Zeppelin Vanilla Tempest |
2022-10-25
⋅
Medium walmartglobaltech
⋅
Brute Ratel Config Decoding update Brute Ratel C4 |
2022-10-25
⋅
VMware Threat Analysis Unit
⋅
Tracking the entire iceberg: long-term APT malware C2 protocol emulation and scanning ShadowPad Winnti |
2022-10-25
⋅
Newly Unsealed Indictment Charges Ukrainian National with International Cybercrime Operation Raccoon |
2022-10-24
⋅
Youtube (Virus Bulletin)
⋅
Uncovering a broad criminal ecosystem powered by one of the largest botnets Glupteba |
2022-10-24
⋅
⋅
AhnLab
⋅
Malware infection case of Lazarus attack group that neutralizes antivirus program with BYOVD technique FudModule LazarDoor Racket Downloader |
2022-10-24
⋅
Medium CSIS Techblog
⋅
Chapter 1 — From Gozi to ISFB: The history of a mythical malware family. Gozi ISFB Snifula |
2022-10-24
⋅
Youtube (Virus Bulletin)
⋅
Russian wipers in the cyberwar against Ukraine AcidRain CaddyWiper DesertBlade DoubleZero EternalPetya HermeticWiper HermeticWizard INDUSTROYER2 IsaacWiper KillDisk PartyTicket WhisperGate |
2022-10-24
⋅
Medium s2wlab
⋅
Unveil the evolution of Kimsuky targeting Android devices with newly discovered mobile malware FastFire FastSpy |
2022-10-24
⋅
Youtube (Virus Bulletin)
⋅
Hunting the AndroidBianLian botnet BianLian |