Click here to download all references as Bib-File.•
2023-04-10
⋅
Sequretek
⋅
Kutaki Stealer - Analysis Kutaki |
2023-04-09
⋅
LianSecurity
⋅
Nexus Android Trojan Analysis Report Nexus S.O.V.A. |
2023-04-05
⋅
Google
⋅
How we’re protecting users from government-backed attacks from North Korea BabyShark |
2023-04-05
⋅
Medium Ilandu
⋅
PortDoor - APT Backdoor analysis ACBackdoor 8.t Dropper PortDoor |
2023-04-04
⋅
Cisco Talos
⋅
Typhon Reborn V2: Updated stealer features enhanced anti-analysis and evasion capabilities Typhon Stealer |
2023-04-03
⋅
Trellix
⋅
A Royal Analysis of Royal Ransom Royal Ransom |
2023-04-03
⋅
Youtube (MalwareAnalysisForHedgehogs)
⋅
Malware Analysis - 3CX SmoothOperator ffmpeg.dll with Binary Ninja 3CX Backdoor |
2023-03-31
⋅
malware.love
⋅
TrueBot Analysis Part III - Capabilities Silence |
2023-03-31
⋅
vmware
⋅
Investigating 3CX Desktop Application Attacks: What You Need to Know 3CX Backdoor |
2023-03-31
⋅
Blackberry
⋅
Initial Implants and Network Analysis Suggest the 3CX Supply Chain Operation Goes Back to Fall 2022 3CX Backdoor |
2023-03-31
⋅
cyble
⋅
A Comprehensive Analysis of the 3CX Attack 3CX Backdoor |
2023-03-31
⋅
Zscaler
⋅
3CX Supply Chain Attack Campaign Campaign Analysis 3CX Backdoor |
2023-03-30
⋅
Zscaler
⋅
Technical Analysis of Xloader’s Code Obfuscation in Version 4.3 Formbook |
2023-03-30
⋅
eSentire
⋅
eSentire Threat Intelligence Malware Analysis: BatLoader BATLOADER Cobalt Strike ISFB SystemBC Vidar |
2023-03-30
⋅
hasherezade's 1001 nights
⋅
Magniber ransomware analysis: Tiny Tracer in action Magniber |
2023-03-30
⋅
Google
⋅
TAG Bulletin: Q1 2023 |
2023-03-29
⋅
Google
⋅
Spyware vendors use 0-days and n-days against popular platforms |
2023-03-28
⋅
ThreatMon
⋅
Chinotto Backdoor Technical Analysis of the APT Reaper’s Powerful Weapon Chinotto |
2023-03-28
⋅
ANY.RUN
⋅
LimeRAT Malware Analysis: Extracting the Config LimeRAT |
2023-03-25
⋅
Analysis Report of Pinduoduo's Malicious Behaviors |