Click here to download all references as Bib-File.•
2020-03-10
⋅
Microsoft
⋅
New action to disrupt world’s largest online criminal network Necurs |
2020-03-05
⋅
JPCERT/CC
⋅
ELF_TSCookie - Linux Malware Used by BlackTech TSCookie |
2020-02-22
⋅
Objective-See
⋅
Weaponizing a Lazarus Group Implant: repurposing a 1st-stage loader, to execute custom 'fileless' payloads AppleJeus |
2020-02-18
⋅
Personal Blog of Christophe Tafani-Dereeper
⋅
Hidden in PEB Sight: Hiding Windows API Imports With a Custom Loader |
2020-02-05
⋅
FireEye
⋅
STOMP 2 DIS: Brilliance in the (Visual) Basics MINEBRIDGE |
2020-01-26
⋅
Youtube (OALabs)
⋅
IDA Pro Automated String Decryption For REvil Ransomware REvil |
2020-01-23
⋅
Bleeping Computer
⋅
Sodinokibi Ransomware Threatens to Publish Data of Automotive Group REvil |
2020-01-21
⋅
Palo Alto Networks Unit 42
⋅
Muhstik Botnet Attacks Tomato Routers to Harvest New IoT Devices Tsunami |
2020-01-07
⋅
Bitdefender
⋅
Hold My Beer Mirai – Spinoff Named ‘LiquorBot’ Incorporates Cryptomining LiquorBot |
2020-01-01
⋅
FireEye
⋅
Mandiant IR Grab Bag of Attacker Activity TwoFace CHINACHOPPER HyperBro HyperSSL |
2019-12-18
⋅
MICROSOFT CORPORATION, Plaintiff, v. JOHN DOES 1-2, CONTROLLING A COMPUTER NETWORK THEREBY INJURING PLAINTIFF AND ITS CUSTOMERS BabyShark Kimsuky |
2019-12-17
⋅
Palo Alto Networks Unit 42
⋅
Rancor: Cyber Espionage Group Uses New Custom Malware to Attack Southeast Asia DDKONG Derusbi KHRAT |
2019-11-26
⋅
ESET Research
⋅
Stantinko botnet adds cryptomining to its pool of criminal activities Stantinko |
2019-11-11
⋅
Virus Bulletin
⋅
APT cases exploiting vulnerabilities in region‑specific software NodeRAT Emdivi PlugX |
2019-09-18
⋅
JPCERT/CC
⋅
Malware Used by BlackTech after Network Intrusion PLEAD |
2019-08-07
⋅
McAfee
⋅
MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play SmsAgent |
2019-08-05
⋅
Reversing Labs
⋅
Catching lateral movement in internal emails SappyCache |
2019-07-09
⋅
JPCERT/CC
⋅
Spear Phishing against Cryptocurrency Businesses CageyChameleon |
2019-06-19
⋅
YouTube (44CON Information Security Conference)
⋅
The Malware CAPE: Automated Extraction of Configuration and Payloads from Sophisticated Malware PlugX |
2019-06-03
⋅
Kindred Security
⋅
Code Analysis of Basic Cryptomining Malware RaspberryPiBotnet |