Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-02-040x00secDan Lisichkin
Analyzing Modern Malware Techniques - Part 3: A case of Powershell, Excel 4 Macros and VB6
2020-01-27Group-IBVesta Matveeva
Operation Night Fury: Group-IB helps take down a cybergang behind the infection of hundreds of websites all over the world
2020-01-20Max Kersten's BlogMax Kersten
Ticket resellers infected with a credit card skimmer
magecart
2020-01-16DCSODCSO
A Curious Case of CVE-2019-19781 Palware: remove_bds
NOTROBIN
2020-01-03DayDayNewsDayDayNews
Waterbear, a cyber espionage virus, has a new variant with its own anti-virus function
Waterbear
2019-12-18US District Court for the Eastern District of Virginia
MICROSOFT CORPORATION, Plaintiff, v. JOHN DOES 1-2, CONTROLLING A COMPUTER NETWORK THEREBY INJURING PLAINTIFF AND ITS CUSTOMERS
BabyShark Kimsuky
2019-12-11Bleeping ComputerLawrence Abrams
Maze Ransomware Behind Pensacola Cyberattack, $1M Ransom Demand
Maze
2019-11-19ACTURédaction Normandie
Une rançon après la cyberattaque au CHU de Rouen ? Ce que réclament les pirates
Clop
2019-11-18ThreatpostLindsey O'Donnell
Pipka Card Skimmer Removes Itself After Infecting eCommerce Sites
2019-11-01Virus BulletinAlexandre Mundo Alguacil, John Fokker
VB2019 paper: Different ways to cook a crab: GandCrab ransomware-as-a-service (RaaS) analysed in depth
Gandcrab
2019-10-29BitdefenderBitdefender
A close look at Fallout Exploit Kit and Raccoon Stealer
Raccoon
2019-09-25GovCERT.chGovCERT.ch
Trickbot - An analysis of data collected from the botnet
TrickBot
2019-09-04Trend MicroJaromír Hořejší, Joseph C. Chen
Glupteba Campaign Hits Network Routers and Updates C&C Servers with Data from Bitcoin Transactions
Glupteba
2019-08-27Cisco TalosPaul Rascagnères, Vanja Svajcer
China Chopper still active 9 years later
CHINACHOPPER
2019-08-26Bleeping ComputerIonut Ilascu
New Nemty Ransomware May Spread via Compromised RDP Connections
Nemty
2019-08-21ThreatgenPascal Ackerman
Taking a Closer Look at the LookBack Malware Campaign – Part 1
Lookback
2019-08-05SophosLabsAlbert Zsigovits
Baldr vs The World: A credential thief's burst of creative energy delivers a dangerous new threat
Baldr
2019-07-30int 0xcc blogRaashid Bhat
Practical Threat Hunting and Incidence Response : A Case of A Pony Malware Infection
Pony
2019-07-24Github (br-data)Hakan Tanriverdi, Jan Strozyk, Maximilian Zierer, Rebecca Ciesielski, Svea Eckert
Winnti analysis
Winnti
2019-07-24Bayerischer RundfunkHakan Tanriverdi, Jan Strozyk, Maximilian Zierer, Rebecca Ciesielski, Svea Eckert
Attacking the Heart of the German Industry
Winnti