Click here to download all references as Bib-File.•
2022-03-18
⋅
Malwarebytes
⋅
Double header: IsaacWiper and CaddyWiper CaddyWiper IsaacWiper |
2022-02-02
⋅
Microsoft
⋅
The evolution of a Mac trojan: UpdateAgent’s progression UpdateAgent |
2022-01-18
⋅
Microsoft
⋅
Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA WhisperGate |
2022-01-15
⋅
Microsoft
⋅
Destructive malware targeting Ukrainian organizations (DEV-0586) WhisperGate DEV-0586 |
2022-01-07
⋅
Malwarebytes
⋅
Patchwork APT caught in its own web BadNews |
2021-12-16
⋅
Avast Decoded
⋅
Avast Finds Backdoor on US Government Commission Network Operation Red Signature |
2021-12-11
⋅
Microsoft
⋅
Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability Khonsari NightSky BRONZE STARLIGHT |
2021-12-09
⋅
Microsoft
⋅
A closer look at Qakbot’s latest building blocks (and how to knock them down) QakBot |
2021-12-02
⋅
Malwarebytes
⋅
SideCopy APT: Connecting lures to victims, payloads to infrastructure SideCopy |
2021-11-16
⋅
Malwarebytes
⋅
TrickBot helps Emotet come back from the dead Emotet TrickBot |
2021-11-11
⋅
Microsoft
⋅
HTML smuggling surges: Highly evasive loader technique increasingly used in banking malware, targeted attacks AsyncRAT Mekotio NjRAT |
2021-11-10
⋅
Sekoia
⋅
Walking on APT31 infrastructure footprints Rekoobe Unidentified ELF 004 Cobalt Strike |
2021-10-21
⋅
Microsoft
⋅
Franken-phish: TodayZoo built from other phishing kits |
2021-09-21
⋅
Microsoft
⋅
Catching the big fish: Analyzing a large-scale phishing-as-a-service operation |
2021-09-15
⋅
Microsoft
⋅
Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability EXOTIC LILY |
2021-09-15
⋅
Microsoft
⋅
Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability Cobalt Strike |
2021-08-26
⋅
Microsoft
⋅
Widespread credential phishing campaign abuses open redirector links |
2021-07-29
⋅
Microsoft
⋅
When coin miners evolve, Part 2: Hunting down LemonDuck and LemonCat attacks Lemon Duck |
2021-07-29
⋅
Microsoft
⋅
BazaCall: Phony call centers lead to exfiltration and ransomware BazarBackdoor Cobalt Strike |
2021-07-22
⋅
Microsoft
⋅
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure Lemon Duck |