Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-09-26cybleCyble
Nexe Backdoor Unleashed: Patchwork APT Group’s Sophisticated Evasion of Defenses
2024-09-18U.S. Department of Justice
Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers
Nosedive
2024-08-15ElasticElastic Security Labs
Beyond the wail: deconstructing the BANSHEE infostealer
BANSHEE
2024-08-14CitizenLabJohn Scott-Railton, Ksenia Ermoshina, Rebekah Brown, Ron Deibert
Rivers of Phish: Sophisticated Phishing Targets Russia’s Perceived Enemies Around the Globe
Callisto
2024-08-01ElasticDaniel Stepanic, Seth Goodwin
BITS and Bytes: Analyzing BITSLOTH, a newly identified backdoor
BITSloth
2024-07-09US Department of JusticeOffice of Public Affairs
Justice Department Leads Efforts Among Federal, International, and Private Sector Partners to Disrupt Covert Russian Government-Operated Social Media Bot Farm
2024-06-26US Department of JusticeOffice of Public Affairs
Russian National Charged for Conspiring with Russian Military Intelligence to Destroy Ukrainian Government Computer Systems and Data
WhisperGate
2024-06-21ElasticJoe Desimone, Samir Bousseaden
GrimResource - Microsoft Management Console for initial access and evasion
Cobalt Strike
2024-06-12ElasticDaniel Stepanic
Dipping into Danger: The WARMCOOKIE backdoor
WarmCookie
2024-06-06MorphisecArnold Osipov
Howling at the Inbox: Sticky Werewolf’s Latest Malicious Aviation Attacks
Angry Likho
2024-06-05SSTICCharles Meslay
Reverse engineering of malicious code in CTI - Analysis of the evolution of an infection chain (Video)
FlowCloud
2024-05-24Check Point Software Technologies LtdCheck Point Research
Bad Karma, No Justice: Void Manticore Destructive Activities in Israel
BiBi-Linux
2024-05-21ElasticAndrew Pease, Salim Bitam, Samir Bousseaden, Terrance DeJesus
Invisible miners: unveiling GHOSTENGINE’s crypto mining operations
win.ghostengine
2024-05-20CheckpointCheckpoint
Bad Karma, No Justice: Void Manticore Destructive Activities in Israel
Void Manticore
2024-05-16AhnLabASEC
Analysis of APT attack cases targeting domestic companies using Dora RAT (Andariel Group)
2024-05-16ElasticDaniel Stepanic, Samir Bousseaden
Spring Cleaning with LATRODECTUS: A Potential Replacement for ICEDID
IcedID Latrodectus
2024-05-10ElasticCyril François, Samir Bousseaden
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Four
Remcos
2024-05-08ElasticElastic
Elastic Security - WarmCookie YARA Rule
WarmCookie
2024-05-07ElasticElastic
Elastic Security - GhostEngine YARA Rule
win.ghostengine
2024-05-03ElasticCyril François, Samir Bousseaden
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Three
Remcos