Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-02-21Cert-UACert-UA
Cyber ​​attack of the group UAC-0050 (UAC-0096) using the Remcos program (CERT-UA#6011)
Remcos UAC-0050
2023-02-21ZscalerNikolaos Pantazopoulos, Sarthak Misraa
Technical Analysis of Rhadamanthys Obfuscation Techniques
Rhadamanthys
2023-02-21SecurityIntelligenceRuben Boonen
Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers
FudModule
2023-02-20SekoiaPierre Le Bourhis, Quentin Bourgue, Threat & Detection Research Team
Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity – Part 1
Stealc
2023-02-200xToxin Labs@0xToxin
Vidar Stealer H&M Campaign
Vidar
2023-02-20TrendmicroByron Gelera, Ivan Nicole Chavez, Nathaniel Morales
Royal Ransomware Expands Attacks by Targeting Linux ESXi Servers
Royal Ransom Royal Ransom
2023-02-20cocomelonccocomelonc
Malware AV/VM evasion - part 12: encrypt payload via TEA. Simple C++ example.
2023-02-19Medium System WeaknessLena (LambdaMamba)
Investigating a Fake KDDI Smishing Campaign that abuses Duck DNS
Roaming Mantis
2023-02-19Geeky Panda TalesGeekyPanda
The Infostealer Pie: Python Malware Analysis
Venus Stealer
2023-02-18secrssQianxin Virus Response Center
Don’t follow in the footsteps of the 4 billion data leak incident! Early warning for attacks in the financial and securities industries
ValleyRAT
2023-02-18malware.loveRobert Giczewski
TrueBot Analysis Part II - Static unpacker
Silence
2023-02-17Trend MicroJaromír Hořejší, Joseph C Chen
Earth Kitsune Delivers New WhiskerSpy Backdoor via Watering Hole Attack
WhiskerSpy Earth Kitsune
2023-02-17cybleCyble
The Many Faces of Qakbot Malware: A Look at Its Diverse Distribution Methods
QakBot
2023-02-17Twitter (@luc4m)Luca Mella
Tweets about Darkbit's intermittent encryption
DarkBit
2023-02-16cybleCyble
ALTOUFAN TEAM Targets the Middle East
Altoufan Team
2023-02-16ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
APT SideCopy Targeting Indian Government Entities - Analysis of the new version of ReverseRAT
Unidentified 005 (Sidecopy) ReverseRAT
2023-02-16SentinelOneAleksandar Milenkoski, Collin Farr, Joey Chen, QGroup
WIP26 Espionage | Threat Actors Abuse Cloud Infrastructure in Targeted Telco Attacks
2023-02-16ThreatZeroRaphael Mendonça
Mass Attack buhtiRansom - CVE-2022–47986
2023-02-16EclecticIQEclecticIQ Threat Research Team
Three Cases of Cyber Attacks on the Security Service of Ukraine and NATO Allies, Likely by Russian State-Sponsored Gamaredon
2023-02-16Trend MicroHara Hiroaki, Masaoki Shoji, Yuka Higashi
Invitation to a Secret Event: Uncovering Earth Yako’s Campaigns
MirrorKey TransBox Earth Yako