Click here to download all references as Bib-File.•
2021-07-06
⋅
Binary Defense
⋅
Mars-Deimos: SolarMarker/Jupyter Infostealer (Part 1) solarmarker |
2021-06-20
⋅
Squiblydoo
⋅
Mars-Deimos: From Jupiter to Mars and Back again (Part Two) solarmarker |
2021-03-15
⋅
Modern War Institute
⋅
Incorporating the Cyberspace Domain: How Russia and China Exploit Asymmetric Advantages in Great Power Competition |
2021-01-25
⋅
Trend Micro
⋅
Fake Office 365 Used for Phishing Attacks on C-Suite Targets |
2020-10-27
⋅
⋅
ID Ransomware
⋅
Mars Ransomware Mars |
2020-10-12
⋅
Advanced Intelligence
⋅
"Front Door" into BazarBackdoor: Stealthy Cybercrime Weapon BazarBackdoor Cobalt Strike Ryuk |
2020-09-21
⋅
Cisco Talos
⋅
The art and science of detecting Cobalt Strike Cobalt Strike |
2020-08-06
⋅
Trend Micro
⋅
Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts |
2020-06-11
⋅
Talos Intelligence
⋅
Tor2Mine is up to their old tricks — and adds a few new ones Azorult Remcos |
2017-07-11
⋅
Trend Micro
⋅
Spam Campaign Delivers Cross-platform Remote Access Trojan Adwind AdWind |
2015-12-08
⋅
The Citizenlab
⋅
Packrat: Seven Years of a South American Threat Actor AdWind Adzok CyberGate Xtreme RAT Packrat |
2015-02-18
⋅
Cyphort
⋅
Babar: Suspected Nation State Spyware In The Spotlight Babar Evilbunny SNOWGLOBE |
2015-02-18
⋅
Cyphort
⋅
Shooting Elephants Babar |
2014-12-16
⋅
Cyphort
⋅
EvilBunny: Malware Instrumented By Lua Evilbunny SNOWGLOBE |
2009-03-17
⋅
Marshal8e6
⋅
Gheg spambot Tofsee |