Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-12-11JPCERT/CCTomoya Kamei
Attack Exploiting Legitimate Service by APT-C-60
SpyGrace
2024-12-10cybleCyble
Head Mare Group Intensifies Attacks on Russia with PhantomCore Backdoor
PhantomCore Head Mare
2024-12-04Rapid7Tyler McGraw
Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware
Black Basta Cobalt Strike DarkGate SystemBC Zloader
2024-11-22VolexitySean Koessel, Steven Adair, Tom Lancaster
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
APT28
2024-11-20CofenseKahng An
Custom I2P RAT “I2Parcae” Delivered via Pornographic Customer Support Form Spam
I2PRAT Unidentified 118
2024-11-18ProofpointProofpoint Threat Research Team, Selena Larson, Tommy Madjar
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape
AsyncRAT Brute Ratel C4 DanaBot DarkGate Latrodectus Lumma Stealer NetSupportManager RAT XWorm
2024-11-10DFIR.chStephan Berger
Reptile's Custom Kernel-Module Launcher
reptile
2024-10-19Emanuele De Lucia on SecurityEmanuele De Lucia
“Hey ESET, Wait for the Leak”: Dissecting the “OctoberSeventh” Wiper targeting ESET customers in Israel
OctoberSeventh
2024-10-17SekoiaQuentin Bourgue, Sekoia TDR
ClickFix tactic: The Phantom Meet
Rhadamanthys Stealc
2024-10-08TrustwaveCris Tomboc, King Orande
Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader
Pronsis Loader Latrodectus Lumma Stealer
2024-09-12Cado SecurityNate Bill, Tara Gould
From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking
perfctl
2024-08-30Denwp ResearchTonmoy Jitu
Anatomy of a Lumma Stealer Attack via Fake CAPTCHA Pages - Part 1
Lumma Stealer
2024-08-29ProofpointPim Trouerbach, Selena Larson, Tommy Madjar
The Malware That Must Not Be Named: Suspected Espionage Campaign Delivers “Voldemort”
Voldemort
2024-08-21OODA LoopOODA Loop
Toyota Customer, Employee Data Leaked in Confirmed Data Breach
ZeroSevenGroup
2024-08-20SiliconAngleDuncan Riley
Toyota alleges stolen customer data published on hacking site came from outside supplier
ZeroSevenGroup
2024-07-26TrellixMathanraj Thangaraju, Max Kersten, Tomer Shloman
Handala’s Wiper Targets Israel
Handala Hatef Handala
2024-07-16JPCERT/CCShusei Tomonaga
MirrorFace Attack against Japanese Organisations
LODEINFO NOOPDOOR
2024-07-15SekoiaSekoia TDR
MuddyWater replaces Atera by custom MuddyRot implant in a recent campaign
bugsleep
2024-06-28Trend MicroAhmed Mohamed Ibrahim, Shubham Singh, Sunil Bharti
Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer
Water Sigbin
2024-06-25Cado SecurityNate Bill
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer
P2Pinfect