Click here to download all references as Bib-File.•
2020-07-13
⋅
FireEye
⋅
SCANdalous! (External Detection Using Network Scan Data and Automation) POWERTON QUADAGENT PoshC2 |
2020-07-10
⋅
Malwarebytes
⋅
Threat spotlight: WastedLocker, customized ransomware WastedLocker |
2020-07-10
⋅
ReversingLabs
⋅
YARA Rules talks and presentation of REVERSING 2020 |
2020-07-07
⋅
Sentinel LABS
⋅
Breaking EvilQuest | Reversing A Custom macOS Ransomware File Encryption Routine EvilQuest |
2020-07-07
⋅
Microsoft
⋅
Microsoft takes legal action against COVID-19-related cybercrime |
2020-06-19
⋅
Click All the Things! Blog
⋅
zloader: VBA, R1C1 References, and Other Tomfoolery Zloader |
2020-06-09
⋅
Sophos Labs
⋅
Kingminer escalates attack complexity for cryptomining Kingminer |
2020-06-09
⋅
Microsoft
⋅
Web shell threat hunting with Azure Sentinel and Microsoft Threat Protection |
2020-06-07
⋅
Zero2Automated Blog
⋅
Dealing with Obfuscated Macros, Statically - NanoCore Nanocore RAT |
2020-06-05
⋅
Votiro
⋅
Anatomy of a Well-Crafted UPS, FedEx, and DHL Phishing Email During COVID-19 Dridex |
2020-05-28
⋅
VMWare Carbon Black
⋅
Modern Bank Heists 3.0 Emotet |
2020-05-19
⋅
zero2auto
⋅
Netwalker Ransomware - From Static Reverse Engineering to Automatic Extraction Mailto |
2020-05-11
⋅
SentinelOne
⋅
The Anatomy of an APT Attack and CobaltStrike Beacon’s Encoded Configuration Cobalt Strike |
2020-05-06
⋅
Prevailion
⋅
Phantom in the Command Shell EVILNUM |
2020-04-29
⋅
Twitter (@h4ckak)
⋅
More IOCs related to PhantomLance PhantomLance |
2020-04-28
⋅
Kaspersky Labs
⋅
Hiding in plain sight: PhantomLance walks into a market PhantomLance |
2020-04-23
⋅
ESET Research
⋅
ESET researchers disrupt cryptomining botnet VictoryGate VictoryGate |
2020-03-19
⋅
ESET Research
⋅
Stantinko’s new cryptominer features unique obfuscation techniques Stantinko |
2020-03-10
⋅
Microsoft
⋅
New action to disrupt world’s largest online criminal network Necurs |
2020-03-05
⋅
JPCERT/CC
⋅
ELF_TSCookie - Linux Malware Used by BlackTech TSCookie |