Click here to download all references as Bib-File.•
2022-09-07
⋅
Google
⋅
Initial access broker repurposing techniques in targeted attacks against Ukraine AnchorMail Cobalt Strike IcedID |
2022-07-20
⋅
Kaspersky
⋅
Luna and Black Basta — new ransomware for Windows, Linux and ESXi Black Basta Conti |
2022-07-19
⋅
ESET Research
⋅
I see what you did there: A look at the CloudMensis macOS spyware CloudMensis |
2022-05-10
⋅
Marco Ramilli's Blog
⋅
A Malware Analysis in RU-AU conflict Cobalt Strike |
2022-05-06
⋅
⋅
LeMagIT
⋅
Ransomware: LockBit 3.0 Starts Using in Cyberattacks LockBit |
2022-04-18
⋅
CitizenLab
⋅
CatalanGate Extensive Mercenary Spyware Operation against Catalans Using Pegasus and Candiru Chrysaor Caramel Tsunami |
2022-04-18
⋅
Trellix
⋅
Conti Group Targets ESXi Hypervisors With its Linux Variant Conti Conti |
2022-04-15
⋅
Center for Internet Security
⋅
Top 10 Malware March 2022 Mirai Shlayer Agent Tesla Ghost RAT Nanocore RAT SectopRAT solarmarker Zeus |
2022-04-12
⋅
Check Point
⋅
March 2022’s Most Wanted Malware: Easter Phishing Scams Help Emotet Assert its Dominance Alien FluBot Agent Tesla Emotet |
2022-04-05
⋅
CitizenLab
⋅
Peace through Pegasus Jordanian Human Rights Defenders and Journalists Hacked with Pegasus Spyware Chrysaor |
2022-03-28
⋅
Trellix
⋅
PlugX: A Talisman to Behold PlugX |
2022-03-25
⋅
GOV.UA
⋅
Who is behind the Cyberattacks on Ukraine's Critical Information Infrastructure: Statistics for March 15-22 Xloader Agent Tesla CaddyWiper Cobalt Strike DoubleZero GraphSteel GrimPlant HeaderTip HermeticWiper IsaacWiper MicroBackdoor Pandora RAT |
2022-03-10
⋅
BrightTALK (Kaspersky GReAT)
⋅
BrightTALK: A look at current cyberattacks in Ukraine HermeticWiper HermeticWizard IsaacWiper PartyTicket WhisperGate |
2022-03-10
⋅
Cisco Talos
⋅
WEDNESDAY, MARCH 9, 2022 Threat advisory: Cybercriminals compromise users with malware disguised as pro-Ukraine cyber tools |
2022-03-09
⋅
BreachQuest
⋅
The Conti Leaks | Insight into a Ransomware Unicorn Cobalt Strike MimiKatz TrickBot |
2022-03-01
⋅
Marco Ramilli's Blog
⋅
DiskKill/HermeticWiper and NotPetya (Dis)similarities EternalPetya HermeticWiper |
2022-02-22
⋅
USENIX
⋅
How Machine Learning Is Solving the Binary Function Similarity Problem |
2022-02-17
⋅
Trellix
⋅
Looking over the nation-state actors’ shoulders: Even they have a difficult day sometimes Empire Downloader |
2022-02-14
⋅
⋅
DR.DK
⋅
Var tæt på at slukke tusindvis af vindmøller: Nu fortæller Vestas om cyberangreb LockBit |
2022-01-25
⋅
Trellix
⋅
Prime Minister’s Office Compromised: Details of Recent Espionage Campaign Graphite |