Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-12-23Stranded on Pylos BlogJoe Slowik
@online{slowik:20201223:mindmap:3aad3e1, author = {Joe Slowik}, title = {{Mindmap on Russia-linked threat groups}}, date = {2020-12-23}, organization = {Stranded on Pylos Blog}, url = {https://pylos.co/wp-content/uploads/2020/12/wp-1608784569812.jpg}, language = {English}, urldate = {2020-12-26} } Mindmap on Russia-linked threat groups
2020-12-18DomainToolsJoe Slowik
@online{slowik:20201218:continuous:71ffa78, author = {Joe Slowik}, title = {{Continuous Eruption: Further Analysis of the SolarWinds Supply Chain Incident}}, date = {2020-12-18}, organization = {DomainTools}, url = {https://www.domaintools.com/resources/blog/continuous-eruption-further-analysis-of-the-solarwinds-supply-incident}, language = {English}, urldate = {2020-12-18} } Continuous Eruption: Further Analysis of the SolarWinds Supply Chain Incident
SUNBURST
2020-12-14DomainToolsJoe Slowik
@online{slowik:20201214:unraveling:d212099, author = {Joe Slowik}, title = {{Unraveling Network Infrastructure Linked to the SolarWinds Hack}}, date = {2020-12-14}, organization = {DomainTools}, url = {https://www.domaintools.com/resources/blog/unraveling-network-infrastructure-linked-to-the-solarwinds-hack}, language = {English}, urldate = {2020-12-15} } Unraveling Network Infrastructure Linked to the SolarWinds Hack
SUNBURST
2020-12-10Stranded on Pylos BlogJoe Slowik
@online{slowik:20201210:terrorism:2f0bd74, author = {Joe Slowik}, title = {{Terrorism or Information Operation?}}, date = {2020-12-10}, organization = {Stranded on Pylos Blog}, url = {https://pylos.co/2020/12/10/terrorism-or-information-operation/}, language = {English}, urldate = {2020-12-23} } Terrorism or Information Operation?
2020-12-08DomainToolsJoe Slowik
@online{slowik:20201208:identifying:0182ebe, author = {Joe Slowik}, title = {{Identifying Critical Infrastructure Targeting through Network Creation}}, date = {2020-12-08}, organization = {DomainTools}, url = {https://www.domaintools.com/resources/blog/identifying-critical-infrastructure-targeting-through-network-creation}, language = {English}, urldate = {2020-12-10} } Identifying Critical Infrastructure Targeting through Network Creation
2020-12-02DomainToolsJoe Slowik
@online{slowik:20201202:identifying:8ac64c3, author = {Joe Slowik}, title = {{Identifying Network Infrastructure Related to a World Health Organization Spoofing Campaign}}, date = {2020-12-02}, organization = {DomainTools}, url = {https://www.domaintools.com/resources/blog/identifying-network-infrastructure-related-to-a-who-spoofing-campaign}, language = {English}, urldate = {2020-12-08} } Identifying Network Infrastructure Related to a World Health Organization Spoofing Campaign
Azorult Glupteba
2020-11-20DomainToolsJoe Slowik, Black Lotus Labs, Lumen
@online{slowik:20201120:current:f9956c6, author = {Joe Slowik and Black Lotus Labs and Lumen}, title = {{Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity}}, date = {2020-11-20}, organization = {DomainTools}, url = {https://www.domaintools.com/resources/blog/current-events-to-widespread-campaigns-pivoting-from-samples-to-identify}, language = {English}, urldate = {2020-11-23} } Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity
2020-11-18DomainToolsJoe Slowik
@online{slowik:20201118:analyzing:abccd43, author = {Joe Slowik}, title = {{Analyzing Network Infrastructure as Composite Objects}}, date = {2020-11-18}, organization = {DomainTools}, url = {https://www.domaintools.com/resources/blog/analyzing-network-infrastructure-as-composite-objects}, language = {English}, urldate = {2020-11-19} } Analyzing Network Infrastructure as Composite Objects
Ryuk
2020-11-11DomainToolsJoe Slowik
@online{slowik:20201111:extrapolating:8998b55, author = {Joe Slowik}, title = {{Extrapolating Adversary Intent Through Infrastructure}}, date = {2020-11-11}, organization = {DomainTools}, url = {https://www.domaintools.com/resources/blog/extrapolating-adversary-intent-through-infrastructure}, language = {English}, urldate = {2020-11-19} } Extrapolating Adversary Intent Through Infrastructure
2020-11-04Stranded on Pylos BlogJoe Slowik
@online{slowik:20201104:enigmatic:c2d7b4e, author = {Joe Slowik}, title = {{The Enigmatic Energetic Bear}}, date = {2020-11-04}, organization = {Stranded on Pylos Blog}, url = {https://pylos.co/2020/11/04/the-enigmatic-energetic-bear/}, language = {English}, urldate = {2020-11-06} } The Enigmatic Energetic Bear
EternalPetya Havex RAT
2020-09-23Stranded on Pylos BlogJoe Slowik
@online{slowik:20200923:understanding:47cffee, author = {Joe Slowik}, title = {{Understanding Uncertainty while Undermining Democracy}}, date = {2020-09-23}, organization = {Stranded on Pylos Blog}, url = {https://pylos.co/2020/09/23/understanding-uncertainty-while-undermining-democracy/}, language = {English}, urldate = {2020-09-24} } Understanding Uncertainty while Undermining Democracy
2020-06-18DragosJoe Slowik
@online{slowik:20200618:ekans:e768da1, author = {Joe Slowik}, title = {{EKANS Ransomware Misconceptions and Misunderstandings}}, date = {2020-06-18}, organization = {Dragos}, url = {https://www.dragos.com/blog/industry-news/ekans-ransomware-misconceptions-and-misunderstandings/}, language = {English}, urldate = {2020-06-19} } EKANS Ransomware Misconceptions and Misunderstandings
Snake
2020-05-28Stranded on Pylos BlogJoe Slowik
@online{slowik:20200528:silos:3527589, author = {Joe Slowik}, title = {{Silos of Excellence}}, date = {2020-05-28}, organization = {Stranded on Pylos Blog}, url = {https://pylos.co/2020/05/28/silos-of-excellence/}, language = {English}, urldate = {2020-05-29} } Silos of Excellence
2020-03DragosJoe Slowik
@techreport{slowik:202003:spyware:412ef8a, author = {Joe Slowik}, title = {{Spyware Stealer Locker Wiper Locker Goga Revisited}}, date = {2020-03}, institution = {Dragos}, url = {https://dragos.com/wp-content/uploads/Spyware-Stealer-Locker-Wiper-LockerGoga-Revisited.pdf}, language = {English}, urldate = {2020-03-18} } Spyware Stealer Locker Wiper Locker Goga Revisited
LockerGoga
2020-01DragosJoe Slowik
@techreport{slowik:202001:threat:d891011, author = {Joe Slowik}, title = {{Threat Intelligence and the Limits of Malware Analysis}}, date = {2020-01}, institution = {Dragos}, url = {https://pylos.co/wp-content/uploads/2020/02/Threat-Intelligence-and-the-Limits-of-Malware-Analysis.pdf}, language = {English}, urldate = {2020-06-10} } Threat Intelligence and the Limits of Malware Analysis
Exaramel Exaramel Industroyer Lookback NjRAT PlugX