Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-03-19Bundesamt für Sicherheit in der InformationstechnikCERT-Bund
Microsoft Exchange Schwachstellen Detektion und Reaktion (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)
CHINACHOPPER MimiKatz
2021-03-18laceworkChris Hall
The “Kek Security” Network
Kaiten N3Cr0m0rPh
2021-03-18VIPREVIPRE Labs
Buer Loader Found in an Unusual Email Attachment
Buer
2021-03-18DeepInstinctBen Gross
Cobalt Strike – Post-Exploitation Attackers Toolkit
Cobalt Strike
2021-03-18Ilya Mogilin, Mikhail Kuzin
Convuster: macOS adware now in Rust
Convuster
2021-03-18Kaspersky LabsIlya Mogilin, Mikhail Kuzin
Convuster: macOS adware now in Rust
2021-03-18PRODAFT Threat IntelligencePRODAFT
SilverFish GroupThreat Actor Report
Cobalt Strike Dridex Koadic
2021-03-18Github (lacework)lacework-labs
DGA and decoder scripts for n3cr0morph IRC malware
N3Cr0m0rPh
2021-03-18SentinelOnePhil Stokes
New macOS malware XcodeSpy Targets Xcode Developers with EggShell Backdoor
2021-03-18CISAUS-CERT
Alert (AA21-077A): Detecting Post-Compromise Threat Activity Using the CHIRP IOC Detection Tool
SUNBURST
2021-03-18ProofpointBrandon Murphy, Dennis Schwarz, Jack Mott, Proofpoint Threat Research Team
Now You See It, Now You Don’t: CopperStealer Performs Widespread Theft
CopperStealer SmokeLoader
2021-03-17CISAUS-CERT
SolarWinds and Active Directory/M365 Compromise: Detecting Advanced Persistent Threat Activity from Known Tactics, Techniques, and Procedures (Dead Link)
SUNBURST
2021-03-17GoggleHeadedHacker BlogJacob Pimental
Automatic Gobfuscator Deobfuscation with EKANS Ransomware
Snake
2021-03-17CrowdStrikeAdam Podlosky, Brendon Feeley
INDRIK SPIDER Supersedes WastedLocker with Hades Ransomware to Circumvent OFAC Sanctions
FriedEx WastedLocker
2021-03-17Avast DecodedJakub Kaloč
Hidden menace: Peeling back the secrets of OnionCrypter
2021-03-16MorphisecNadav Lorber
Tracking HCrypt: An Active Crypter as a Service
AsyncRAT LimeRAT Remcos
2021-03-15BugurooBuguroo
Toddler: Credential theft through overlays and accessibility event logging
Anatsa
2021-03-15Sophos LabsMark Loman
DearCry ransomware attacks exploit Exchange server vulnerabilities
dearcry WannaCryptor
2021-03-15TrustwaveJoshua Deacon
HAFNIUM, China Chopper and ASP.NET Runtime
CHINACHOPPER
2021-03-15Modern War InstituteChristopher Marsh, Mark Grzegorzewski
Incorporating the Cyberspace Domain: How Russia and China Exploit Asymmetric Advantages in Great Power Competition