Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-10-24Youtube (Virus Bulletin)Google Threat Analysis Group, Luca Nagy
Uncovering a broad criminal ecosystem powered by one of the largest botnets
Glupteba
2022-10-24AhnLabASEC Analysis Team
Malware infection case of Lazarus attack group that neutralizes antivirus program with BYOVD technique
FudModule LazarDoor Racket Downloader
2022-10-24Medium CSIS TechblogBenoît Ancel
Chapter 1 — From Gozi to ISFB: The history of a mythical malware family.
Gozi ISFB Snifula
2022-10-24Youtube (Virus Bulletin)Alexander Adamov
Russian wipers in the cyberwar against Ukraine
AcidRain CaddyWiper DesertBlade DoubleZero EternalPetya HermeticWiper HermeticWizard INDUSTROYER2 IsaacWiper KillDisk PartyTicket WhisperGate
2022-10-24Medium s2wlabLee Sebin, Shin Yeongjae
Unveil the evolution of Kimsuky targeting Android devices with newly discovered mobile malware
FastFire FastSpy
2022-10-24Youtube (Virus Bulletin)Axelle Apvrille
Hunting the AndroidBianLian botnet
BianLian
2022-10-23BlackberryThe BlackBerry Research & Intelligence Team
Unattributed RomCom Threat Actor Spoofing Popular Apps Now Hits Ukrainian Militaries
ROMCOM RAT RomCom
2022-10-22MicrosoftMicrosoft Security Threat Intelligence
DEV-0952 deploys Daixin ransomware at hospitals
2022-10-21ZscalerAvinash Kumar, Niraj Shivtarkar
WarHawk: the New Backdoor in the Arsenal of the SideWinder APT Group
WarHawk
2022-10-21SymantecThreat Hunter Team
Exbyte: BlackByte Ransomware Attackers Deploy New Exfiltration Tool
ExByte
2022-10-21CISAFBI, HHS, US-CERT
Alert (AA22-294A) #StopRansomware: Daixin Team
2022-10-20cybleCyble Research Labs
New Temp Stealer Spreading Via Free & Cracked Software
TempStealer
2022-10-20FortinetCara Lin
Mirai, RAR1Ransom, and GuardMiner – Multiple Malware Campaigns Target VMware Vulnerability
Mirai
2022-10-20Bleeping ComputerBill Toulas
Hacking group updates Furball Android spyware to evade detection
FurBall
2022-10-19MandiantJesse Valdez, Sandor Nemes, Sulian Lebegue
From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind
LDR4
2022-10-18LogpointAnish Bogati, Nilaa Maharjan
Hunting Lockbit Variation
LockBit
2022-10-18IntrinsecCERT Intrinsec, Intrinsec
APT27 – One Year To Exfiltrate Them All: Intrusion In-Depth Analysis
HyperBro MimiKatz
2022-10-17Atlantic CouncilBulelani Jili
China’s surveillance ecosystem and the global spread of its tools
2022-10-17ASECASEC
Amadey Bot Disguised as a Famous Korean Messenger Program Being Distributed
Amadey
2022-10-17SecurityScorecardVlad Pasca
A Detailed Analysis of the Gafgyt Malware Targeting IoT Devices
Bashlite