Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-12-31MaveritsMaverits
APT28 the long hand of Russian interests
MooBot STEELHOOK MASEPIE HATVIBE CredoMap Headlace OCEANMAP
2024-12-31SOCRadarSOCRadar
Dark Web Profile: Gamaredon APT - SOCRadar® Cyber Intelligence Inc.
2024-12-30FortinetChris Hall
Catching "EC2 Grouper"- no indicators required!
EC2 Grouper
2024-12-30IntrinsecCTI Intrinsec
CryptBot: Hunting for initial access vectors
CryptBot Lumma Stealer PrivateLoader
2024-12-30Medium TRAC LabsTRAC Labs
Advancing Through the Cyberfront, LegionLoader Commander
Satacom
2024-12-29cocomelonccocomelonc
Malware and cryptography 38 - Encrypt/decrypt payload via Camellia cipher. S-box analyses examples. Simple C example.
2024-12-28Medium s.lontzetidisEfstratios Lontzetidis
Lumma 2024: Dominating the Info-Stealer Market
Lumma Stealer
2024-12-26Weixin360 Threat Intelligence Center
Analysis of the attack activities of APT-C-26 (Lazarus) using weaponized IPMsg software
ComeBacker
2024-12-24LinkedIn (Idan Tarab)Idan Tarab
Under Siege: Sandworm's Fake Army+ App Threatens Ukraine’s Military Operations
2024-12-24NTT Security HoldingsNTT Security Holdings
Contagious Interview Uses New Malware Otter Cookie
BeaverTail OtterCookie InvisibleFerret
2024-12-23FBIDC3, FBI, NPA
FBI, DC3, and NPA Identification of North Korean Cyber Actors, Tracked as TraderTraitor, Responsible for Theft of $308 Million USD from Bitcoin.DMM.com
2024-12-20Ryan WeilRyan Weil
Deobfuscation of Lumma Stealer
Lumma Stealer
2024-12-20Twitter (@CERTCyberdef)Alexandre Matousek, Marine PICHON
Tweet on Emmenhtal v2
Emmenhtal
2024-12-20Team CymruLewis Henderson
Jingle Shells: How Virtual Offices Enable a Facade of Legitimacy
2024-12-19SpyCloudJames
LummaC2 Revisited: What’s Making this Stealer Stealthier and More Lethal
GhostSocks Lumma Stealer
2024-12-19SPURSpur Engineering
Astrill VPN and DPRK Remote Worker Fraud
2024-12-19Kaspersky LabsSojun Ryu, Vasily Berdnikov
Lazarus group evolves its infection chain with old and new malware
MISTPEN
2024-12-19Bleeping ComputerBill Toulas
BadBox malware botnet infects 192,000 Android devices despite disruption
BADBOX
2024-12-18Kaspersky LabsKaspersky
Analysis of Cyber Anarchy Squad attacks targeting Russian and Belarusian organizations
Babuk LockBit Revenge RAT SparkRAT Cyber Alliance Ukrainian Cyber Alliance
2024-12-18eSentireeSentire Threat Response Unit (TRU)
Winos4.0 “Online Module” Staging Component Used in CleverSoar Campaign
ValleyRAT