Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-12-17FireEyeKelli Vanderlee
DebUNCing Attribution: How Mandiant Tracks Uncategorized Threat Actors
2020-12-17Trend MicroFeike Hacquebord, Lord Alfred Remorin
Pawn Storm’s Lack of Sophistication as a Strategy
DriveOcean
2020-12-17TrustedSecTrustedsec
SolarWinds Backdoor (Sunburst) Incident Response Playbook
SUNBURST
2020-12-17TRUESECFabio Viggiani
The SolarWinds Orion SUNBURST supply-chain Attack
SUNBURST
2020-12-17Youtube (Colin Hardy)Colin Hardy
SUNBURST SolarWinds Malware - Tools, Tactics and Methods to get you started with Reverse Engineering
SUNBURST
2020-12-17McAfeeCedric Cochin, Christiaan Beek, Raj Samani
Additional Analysis into the SUNBURST Backdoor
SUNBURST
2020-12-17EST SecurityAlyac
Thallium organization attacks domestic blockchain company with documents of non-delinquency confirmation
2020-12-17The Wall Street JournalDustin Volz, Robert McMillan
Hack Suggests New Scope, Sophistication for Cyberattacks
2020-12-17ZDNetCatalin Cimpanu
Microsoft confirms it was also breached in recent SolarWinds supply chain hack
2020-12-17ESET ResearchIgnacio Sanmillan, Matthieu Faou
Operation SignSight: Supply‑chain attack against a certification authority in Southeast Asia
SManager
2020-12-16PastebinAnonymous
Paste of subdomain & DGA domain names used in SolarWinds attack
SUNBURST UNC2452
2020-12-16Cyborg SecurityJosh Meltzer
SUNBURST: SolarWinds Supply-Chain Attack
SUNBURST
2020-12-16Twitter @cybercdh)Colin Hardy
Tweet on 3 key actions SUNBURST performs as soon as it's invoked
SUNBURST
2020-12-16Click All the Things! BlogJamie
Snake/404 Keylogger, BIFF, and Covering Tracks?: An unusual maldoc
2020-12-16CloudflareJesse Kipp, Malavika Balachandran Tadeusz
Trend data on the SolarWinds Orion compromise
SUNBURST
2020-12-16Bleeping ComputerLawrence Abrams
FireEye, Microsoft create kill switch for SolarWinds backdoor
SUNBURST
2020-12-16DragosCamille Singleton, IBM SECURITY X-FORCE, Selena Larson
Assessing Ransomware and Extortion Activities Impacting Industrial Organizations: Ransomware in ICS Environments
REvil
2020-12-16ReutersRaphael Satter
Exclusive-Suspected Chinese hackers stole camera footage from African Union - memo
2020-12-16LookoutApurva Kumar, Diane Wee, Justin Albrecht, Robert Nickle
Lookout Discovers New Spyware Used by Sextortionists to Blackmail iOS and Android Users
goontact
2020-12-16AccenturePaul Mansfield
Tracking and combatting an evolving danger: Ransomware extortion
DarkSide Egregor Maze Nefilim RagnarLocker REvil Ryuk SunCrypt