Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-10-01Trend MicroJaromír Hořejší, Joseph C. Chen
New Fileless Botnet Novter Distributed by KovCoreG Malvertising Campaign
Divergent
2019-10-01Trend MicroJaromír Hořejší, Joseph C. Chen
New Fileless Botnet Novter Distributed by KovCoreG Malvertising Campaign
Divergent
2019-09-20Trend MicroLuis Magisa
Mac Malware that Spoofs Trading App Steals User Information, Uploads it to Website
Gmera
2019-09-19Trend MicroMaverick Pascual
Fileless Cryptocurrency-Miner GhostMiner Weaponizes WMI Objects, Kills Other Cryptocurrency-Mining Payloads
GhostMiner
2019-09-09Trend MicroEarle Earnshaw, Johnlery Triunfante
‘Purple Fox’ Fileless Malware with Rookit Component Delivered by Rig Exploit Kit Now Abuses PowerShell
PurpleFox
2019-09-04Trend MicroJaromír Hořejší, Joseph C. Chen
Glupteba Campaign Hits Network Routers and Updates C&C Servers with Data from Bitcoin Transactions
Glupteba
2019-08-27Trend MicroHara Hiroaki, Jaromír Hořejší, Loseway Lu
TA505 At It Again: Variety is the Spice of ServHelper and FlawedAmmyy
FlawedAmmyy ServHelper
2019-08-22Trend MicroIan Mercado, Mhica Romero
Asruex Backdoor Variant Infects Word Documents and PDFs Through Old MS Office and Adobe Vulnerabilities
Asruex
2019-08-15Trend MicroAliakbar Zahravi
Analysis: New Remcos RAT Arrives Via Phishing Email
Remcos
2019-08-05Trend MicroMichael Jhon Ofiaza, Noel Anthony Llimos
Latest Trickbot Campaign Delivered via Highly Obfuscated JS File
ostap TrickBot
2019-07-04Trend MicroTrend Micro
Latest Spam Campaigns from TA505 Now Using New Malware Tools Gelup and FlowerPippi
AndroMut
2019-06-18Trend MicroEcular Xu, Grey Guo
Mobile Campaign ‘Bouncing Golf’ Affects Middle East
FurBall Domestic Kitten
2019-06-18Trend MicroEcular Xu, Grey Guo
Mobile Campaign ‘Bouncing Golf’ Affects Middle East (IoCs)
FurBall
2019-06-10Trend MicroDaniel Lunghi, Jaromír Hořejší
New MuddyWater Activities Uncovered: Threat Actors Used Multi-Stage Backdoors, New Post-Exploitation Tools, Android Malware, and More
Mudwater SHARPSTATS
2019-06-10Trend MicroDaniel Lunghi, Jaromír Hořejší
MuddyWater Resurfaces, Uses Multi-Stage Backdoor POWERSTATS V3 and New Post-Exploitation Tools
POWERSTATS
2019-05-08Trend MicroRaphael Centeno
Dharma Ransomware Uses AV Tool to Distract from Malicious Activities
Dharma
2019-05-07Trend MicroAugusto Remillano II, Robert Malagad
CVE-2019-3396 Redux: Confluence Vulnerability Exploited to Deliver Cryptocurrency Miner With Rootkit
kerberods
2019-05-07Trend MicroTrendmicro
MegaCortex Ransomware Spotted Attacking Enterprise Networks
MegaCortex
2019-05-03Trend MicroJoseph C Chen
Mirrorthief Group Uses Magecart Skimming Attack to Hit Hundreds of Campus Online Stores in US and Canada
magecart
2019-04-25Trend MicroTrendmicro
Emotet Adds New Evasion Technique
Emotet