Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-10-13ElasticRemco Sprooten, Ruben Groenewoud
Declawing PUMAKIT
PUMAKIT
2024-10-12QianxinQianxin Threat Intelligence Center
Bitter Group Launches New Trojan Miyarat, Domestic Users Become Primary Ttargets
MiyaRAT
2024-10-10US Department of DefenseCNMF, NCSC UK, NSA, US Department of Justice
Update on SVR Cyber Operations and Vulnerability Exploitation
2024-10-03Virus BulletinSalim Bitam
Sugarcoating KANDYKORN: a sweet dive into a sophisticated MacOS backdoor
HLOADER KANDYKORN SUGARLOADER
2024-10-03US Department of JusticeOffice of Public Affairs
Justice Department Disrupts Russian Intelligence Spear-Phishing Efforts
Callisto
2024-09-27ElasticRemco Sprooten, Ruben Groenewoud
Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse
Kaiji RudeDevil
2024-09-26cybleCyble
Nexe Backdoor Unleashed: Patchwork APT Group’s Sophisticated Evasion of Defenses
2024-09-18U.S. Department of Justice
Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers
Nosedive
2024-08-15ElasticElastic Security Labs
Beyond the wail: deconstructing the BANSHEE infostealer
BANSHEE
2024-08-14CitizenLabJohn Scott-Railton, Ksenia Ermoshina, Rebekah Brown, Ron Deibert
Rivers of Phish: Sophisticated Phishing Targets Russia’s Perceived Enemies Around the Globe
Callisto
2024-08-01ElasticDaniel Stepanic, Seth Goodwin
BITS and Bytes: Analyzing BITSLOTH, a newly identified backdoor
BITSloth
2024-07-09US Department of JusticeOffice of Public Affairs
Justice Department Leads Efforts Among Federal, International, and Private Sector Partners to Disrupt Covert Russian Government-Operated Social Media Bot Farm
2024-06-26US Department of JusticeOffice of Public Affairs
Russian National Charged for Conspiring with Russian Military Intelligence to Destroy Ukrainian Government Computer Systems and Data
WhisperGate
2024-06-21ElasticJoe Desimone, Samir Bousseaden
GrimResource - Microsoft Management Console for initial access and evasion
Cobalt Strike
2024-06-12ElasticDaniel Stepanic
Dipping into Danger: The WARMCOOKIE backdoor
WarmCookie
2024-06-06MorphisecArnold Osipov
Howling at the Inbox: Sticky Werewolf’s Latest Malicious Aviation Attacks
Angry Likho
2024-06-05SSTICCharles Meslay
Reverse engineering of malicious code in CTI - Analysis of the evolution of an infection chain (Video)
FlowCloud
2024-05-24Check Point Software Technologies LtdCheck Point Research
Bad Karma, No Justice: Void Manticore Destructive Activities in Israel
BiBi-Linux
2024-05-21ElasticAndrew Pease, Salim Bitam, Samir Bousseaden, Terrance DeJesus
Invisible miners: unveiling GHOSTENGINE’s crypto mining operations
win.ghostengine
2024-05-20CheckpointCheckpoint
Bad Karma, No Justice: Void Manticore Destructive Activities in Israel
Void Manticore