Click here to download all references as Bib-File.•
| 2020-06-02
⋅
NCC Group
⋅
In-depth analysis of the new Team9 malware family BazarBackdoor |
| 2020-05-27
⋅
NCC Group
⋅
Detecting Rclone – An Effective Tool for Exfiltration |
| 2018-06-12
⋅
NCC Group
⋅
CVE-2017-8570 RTF and the Sisfader RAT Sisfader |
| 2018-05-18
⋅
NCC Group
⋅
Emissary Panda – A potential new malicious tool HttpBrowser |
| 2018-04-20
⋅
NCC Group
⋅
Decoding network data from a Gh0st RAT variant Ghost RAT APT27 |
| 2018-04-17
⋅
NCC Group
⋅
Decoding network data from a Gh0st RAT variant Ghost RAT APT27 |
| 2018-03-16
⋅
Github (nccgroup)
⋅
Royal APT - APT15 Repository BS2005 MS Exchange Tool RoyalCli Royal DNS APT15 |
| 2018-03-10
⋅
NCC Group
⋅
APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS BS2005 MS Exchange Tool RoyalCli Royal DNS APT15 |
| 2017-09-19
⋅
NCC Group
⋅
EternalGlue part one: Rebuilding NotPetya to assess real-world resilience EternalPetya |
| 2017-08-31
⋅
NCC Group
⋅
Analysing a recent Poison Ivy sample Poison Ivy |
| 2016-07-14
⋅
Github (nccgroup)
⋅
Technical Notes on Sakula Sakula RAT |
| 2016-06-16
⋅
NCC Group
⋅
Sakula: an adventure in DLL planting |