Click here to download all references as Bib-File.•
2022-04-25
⋅
Mandiant
⋅
INDUSTROYER.V2: Old Malware Learns New Tricks INDUSTROYER2 |
2022-04-25
⋅
Cybereason
⋅
THREAT ANALYSIS REPORT: SocGholish and Zloader – From Fake Updates and Installers to Owning Your Systems FAKEUPDATES Zloader |
2022-04-25
⋅
Netresec
⋅
Industroyer2 IEC-104 Analysis INDUSTROYER2 |
2022-04-25
⋅
paloalto Networks Unit 42
⋅
Defeating BazarLoader Anti-Analysis Techniques BazarBackdoor |
2022-04-25
⋅
Morphisec
⋅
New Core Impact Backdoor Delivered Via VMware Vulnerability Cobalt Strike JSSLoader |
2022-04-25
⋅
Medium proferosec-osm
⋅
Static unpacker and decoder for Hello Kitty Packer HelloKitty |
2022-04-25
⋅
SANS ISC
⋅
Simple PDF Linking to Malicious Content |
2022-04-24
⋅
Github (Stealerium)
⋅
Github Repository for Stealerium Stealerium |
2022-04-23
⋅
F5
⋅
Cryptojacking on the Fly: TeamTNT Using NVIDIA Drivers to Mine Cryptocurrency |
2022-04-23
⋅
Stranded on Pylos Blog
⋅
Industroyer2 in Perspective INDUSTROYER2 |
2022-04-21
⋅
Gdata
⋅
Criminals provide Ginzo stealer for free, now it is gaining traction Ginzo Stealer ZingoStealer |
2022-04-21
⋅
Stairwell
⋅
The ink-stained trail of GOLDBACKDOOR GOLDBACKDOOR |
2022-04-21
⋅
eSentire
⋅
Hackers Spearphish Corporate Hiring Managers with Poisoned Resumes, Infecting Them with the More_Eggs Malware, Warns eSentire More_eggs TerraLoader VenomLNK |
2022-04-21
⋅
Blackberry
⋅
Threat Thursday: BlackGuard Infostealer Rises from Russian Underground Markets BlackGuard |
2022-04-21
⋅
Secureworks
⋅
GOLD ULRICK Continues Conti Operations Despite Public Disclosures Conti Conti |
2022-04-21
⋅
ZeroSec
⋅
Understanding Cobalt Strike Profiles - Updated For Cobalt Strike 4.6 Cobalt Strike |
2022-04-21
⋅
CrowdStrike
⋅
LemonDuck Targets Docker for Cryptomining Operations Lemon Duck |
2022-04-21
⋅
Sentinel LABS
⋅
Nokoyawa Ransomware | New Karma/Nemty Variant Wears Thin Disguise Hive Karma Nemty Nokoyawa Ransomware |
2022-04-20
⋅
CISA
⋅
TraderTraitor: North Korean State-Sponsored APT Targets Blockchain Companies Bankshot TraderTraitor |
2022-04-20
⋅
cocomelonc
⋅
Malware development: persistence - part 1. Registry run keys. C++ example. Agent Tesla Amadey BlackEnergy Cobian RAT COZYDUKE Emotet Empire Downloader Kimsuky |