Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-12-20Twitter (@CERTCyberdef)Alexandre Matousek, Marine PICHON
Tweet on Emmenhtal v2
Emmenhtal
2024-12-19SpyCloudJames
LummaC2 Revisited: What’s Making this Stealer Stealthier and More Lethal
GhostSocks Lumma Stealer
2024-12-18Kaspersky LabsKaspersky
Analysis of Cyber Anarchy Squad attacks targeting Russian and Belarusian organizations
Babuk LockBit Revenge RAT SparkRAT Cyber Alliance Ukrainian Cyber Alliance
2024-12-18eSentireeSentire Threat Response Unit (TRU)
Winos4.0 “Online Module” Staging Component Used in CleverSoar Campaign
ValleyRAT
2024-12-18Bleeping ComputerSergiu Gatlan
Raccoon Stealer malware operator gets 5 years in prison after guilty plea
Raccoon RecordBreaker
2024-12-18KELAKELA’s Research Team
Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives?
2024-12-17Trend MicroFeike Hacquebord, Stephen Hilt
Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks
2024-12-17CybereasonElena Odier, Gal Romano, Hema Loganathan, Ralph Villanueva
Your Data Is Under New Lummanagement: The Rise of LummaStealer
Lumma Stealer
2024-12-17ProofpointDavid Galazin, Konstantin Klinger, Nick Attfield, Pim Trouerbach
Hidden in Plain Sight: TA397’s New Attack Chain Delivers Espionage RATs
MiyaRAT WmRAT HAZY TIGER
2024-12-16ArmisMichael Freeman
IOControl Malware: What’s New, What’s Not?
elf.iocontrol
2024-12-16GdataBanu Ramakrishnan
New I2PRAT communicates via anonymous peer-to-peer network
Unidentified 118
2024-12-16cocomelonccocomelonc
Malware and cryptography 36 - random sbox generation algorithms: Fisher-Yates shuffle. Simple C example.
2024-12-16MorphisecMorphisec Labs, Nadav Lorber
CoinLurker: The Stealer Powering the Next Generation of Fake Updates
ClearFake FAKEUPDATES
2024-12-16ZscalerThreatLabZ research team
Technical Analysis of RiseLoader
RiseLoader
2024-12-16Guardio LabsNati Tal
“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising
Lumma Stealer
2024-12-14Axel's IT Security ResearchAxel Mahr
How to Identify XenoRAT C2 Servers
XenoRAT
2024-12-12Bleeping ComputerBill Toulas
New IOCONTROL malware used in critical infrastructure attacks
elf.iocontrol
2024-12-11JPCERT/CCTomoya Kamei
Attack Exploiting Legitimate Service by APT-C-60
SpyGrace
2024-12-11SublimeSublime Security
Xloader deep dive: Link-based malware delivery via SharePoint impersonation
Xloader Formbook
2024-12-11MicrosoftMicrosoft Threat Intelligence
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine
Amadey Kazuar Wipbot FlyingYeti