Click here to download all references as Bib-File.•
| 2025-03-22
⋅
Trend Micro
⋅
Back to Business: Lumma Stealer Returns with Stealthier Methods Lumma Stealer |
| 2025-03-14
⋅
Trend Micro
⋅
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware FAKEUPDATES RansomHub |
| 2025-03-11
⋅
Trend Micro
⋅
AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution Lumma Stealer SmartLoader |
| 2025-03-05
⋅
Trend Micro
⋅
Water Ouroboros Hunters International SharpRhino |
| 2025-03-03
⋅
Trend Micro
⋅
Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal Black Basta Black Basta Cactus ReedBed |
| 2025-02-20
⋅
Trend Micro
⋅
Updated Shadowpad Malware Leads to Ransomware Deployment EvilExtractor PlugX ShadowPad Teleboyi |
| 2025-02-20
⋅
Trend Micro
⋅
Updated Shadowpad Malware Leads to Ransomware Deployment EvilExtractor NailaoLocker PlugX ShadowPad |
| 2025-02-04
⋅
Trend Micro
⋅
CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks SmokeLoader |
| 2025-01-21
⋅
Trend Micro
⋅
Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions Cobalt Strike HemiGate ShadowPad SNAPPYBEE SparrowDoor UNC4841 |
| 2024-12-17
⋅
Trend Micro
⋅
Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks |
| 2024-12-05
⋅
Trend Micro
⋅
MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks |
| 2024-11-26
⋅
Trend Micro
⋅
Guess Who’s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024 Anel MirrorFace |
| 2024-11-25
⋅
Trend Micro
⋅
Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions MASOL SNAPPYBEE |
| 2024-11-19
⋅
Trend Micro
⋅
Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella Cobalt Strike LODEINFO NOOPDOOR MirrorFace |
| 2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb |
| 2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb Water Barghest |
| 2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghests Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb |
| 2024-11-08
⋅
Trend Micro
⋅
Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations |
| 2024-10-23
⋅
Trend Micro
⋅
Unmasking Prometei: A Deep Dive Into Our MXDR Findings Prometei |
| 2024-10-16
⋅
Trend Micro
⋅
Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data BockLit |