Click here to download all references as Bib-File.•
2022-05-04
⋅
Mandiant
⋅
Old Services, New Tricks: Cloud Metadata Abuse by UNC2903 WSO |
2022-04-19
⋅
cyble
⋅
Fake MetaMask App Steals Cryptocurrency |
2022-04-10
⋅
Bleeping Computer
⋅
New Meta information stealer distributed in malspam campaign BlackGuard Mars Stealer Raccoon |
2022-04-06
⋅
SANS ISC
⋅
Windows MetaStealer Malware |
2022-04-06
⋅
InfoSec Handlers Diary Blog
⋅
Windows MetaStealer Malware MetaStealer |
2022-04-01
⋅
Adversarial Threat Report |
2022-02-28
⋅
Bleeping Computer
⋅
Meta: Ukrainian officials, military targeted by Ghostwriter hackers Ghostwriter |
2022-02-28
⋅
Twitter (@M_haggis)
⋅
Tweet on parsing Daxin driver metadata using powershell Daxin |
2022-02-28
⋅
Bleeping Computer
⋅
Meta: Ukrainian officials, military targeted by Ghostwriter hackers Ghostwriter |
2022-02-26
⋅
META
⋅
Meta’s Ongoing Efforts Regarding Russia’s Invasion of Ukraine |
2022-02-09
⋅
Bleeping Computer
⋅
Meta and Chime sue Nigerians behind Facebook, Instagram phishing |
2022-02-02
⋅
IBM
⋅
TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware BazarBackdoor TrickBot |
2021-12-07
⋅
sysdig
⋅
Threat news: TeamTNT stealing credentials using EC2 Instance Metadata TeamTNT |
2021-11-16
⋅
META
⋅
Taking Action Against Hackers in Pakistan and Syria SideCopy |
2021-11-01
⋅
META
⋅
October 2021 Coordinated Inauthentic Behavior Report |
2021-09-02
⋅
⋅
AhnLab
⋅
Attacks using metasploit meterpreter Appleseed Meterpreter |
2021-09-02
⋅
nviso
⋅
Anatomy and Disruption of Metasploit Shellcode |
2021-08-06
⋅
⋅
metabaseq
⋅
Inside DarkSide, the ransomware that attacked Colonial Pipeline DarkSide |
2021-06-02
⋅
Trend Micro
⋅
Taking Advantage of PE Metadata,or How To Complete your Favorite ThreatActor’s Sample Collection (Paper) HyperSSL |
2021-06-02
⋅
Trend Micro
⋅
Taking Advantage of PE Metadata, or How To Complete Your Favorite Threat Actor’s Sample Collection HyperSSL |