Click here to download all references as Bib-File.•
2021-03-05
⋅
Reddit Crowdstrike
⋅
2021-03-05 - Cool Query Friday - Hunting For Renamed Command Line Programs |
2021-03-05
⋅
Huntress Labs
⋅
Operation Exchange Marauder CHINACHOPPER |
2021-03-04
⋅
Huntress Labs
⋅
Operation Exchange Marauder CHINACHOPPER |
2021-03-03
⋅
Huntress Labs
⋅
Rapid Response: Mass Exploitation of On-Prem Exchange Servers CHINACHOPPER HAFNIUM |
2021-03-03
⋅
Huntress Labs
⋅
Mass exploitation of on-prem Exchange servers :( CHINACHOPPER HAFNIUM |
2021-03-02
⋅
Github (microsoft)
⋅
Microsoft-365-Defender-Hunting-Queries for hunting Gootkit malware delivery and C2 GootKit |
2021-03-02
⋅
Medium Mehmet Ergene
⋅
Hunting for the Behavior: Scheduled Tasks |
2021-02-25
⋅
Microsoft
⋅
CodeQL queries to hunt for Solorigate activity SUNBURST |
2021-02-25
⋅
Microsoft
⋅
Microsoft open sources CodeQL queries used to hunt for Solorigate activity SUNBURST |
2021-02-25
⋅
BrightTALK (FireEye)
⋅
Light in the Dark: Hunting for SUNBURST SUNBURST |
2021-02-18
⋅
Symantec
⋅
Lazarus: Three North Koreans Charged for Financially Motivated Attacks AppleJeus POOLRAT Unidentified macOS 001 (UnionCryptoTrader) AppleJeus Unidentified 077 (Lazarus Downloader) |
2021-02-16
⋅
FireEye
⋅
Light in the Dark: Hunting for SUNBURST SUNBURST |
2021-02-16
⋅
Google
⋅
TAG Bulletin: Q1 2021 |
2021-02-11
⋅
Twitter (@malwrhunterteam)
⋅
Tweet on one of the first Fedex-themed lures for FluBot FluBot |
2021-02-10
⋅
Anheng Threat Intelligence Center
⋅
Windows kernel zero-day exploit (CVE-2021-1732) is used by BITTER APT in targeted attack |
2021-02-04
⋅
HAL
⋅
From TTP to IoC: Advanced Persistent Graphs forThreat Hunting |
2021-02-01
⋅
One Night in Norfolk
⋅
DPRK Targeting Researchers II: .Sys Payload and Registry Hunting ComeBacker |
2021-01-28
⋅
Huntress Labs
⋅
Analyzing Ryuk Another Link in the Cyber Attack Chain BazarBackdoor Ryuk |
2021-01-28
⋅
axios
⋅
In cyber espionage, U.S. is both hunted and hunter |
2021-01-26
⋅
⋅
Anheng Threat Intelligence Center
⋅
Undefeated, hackers use Visual Studio compiler features to target binary vulnerabilities security researcher |