Click here to download all references as Bib-File.•
2020-09-24
⋅
Facebook
⋅
Removing Coordinated Inauthentic Behavior |
2020-09-24
⋅
Graphika
⋅
GRU and the Minions: Further Exposures of Russian Military Assets Across Platforms, 2013-2020 |
2020-09-24
⋅
SophosLabs Uncut
⋅
Email-delivered MoDi RAT attack pastes PowerShell commands DBatLoader |
2020-09-24
⋅
Click All the Things! Blog
⋅
zLoader XLM Update: Macro code and behavior change Zloader |
2020-09-23
⋅
paloalto Netoworks: Unit42
⋅
Case Study: Emotet Thread Hijacking, an Email Attack Technique Emotet |
2020-09-23
⋅
Stranded on Pylos Blog
⋅
Understanding Uncertainty while Undermining Democracy |
2020-09-22
⋅
vmware
⋅
Detecting Threats in Real-time With Active C2 Information Agent.BTZ Cobalt Strike Dacls NetWire RC PoshC2 Winnti |
2020-09-22
⋅
Sophos SecOps
⋅
MTR Casebook: Blocking a $15 million Maze ransomware attack Maze |
2020-09-22
⋅
Youtube (Virus Bulletin)
⋅
Ramsay: A cyber-espionage toolkit tailored for air-gapped networks Ramsay |
2020-09-22
⋅
Digital Shadows
⋅
DarkSide: The New Ransomware Group Behind Highly Targeted Attacks DarkSide |
2020-09-22
⋅
FBI
⋅
Alert Number I-092220-PSA: Foreign Actors and Cybercriminals Likely to Spread Disinformation Regarding 2020 Election Results |
2020-09-22
⋅
Twitter (@Nocturnus)
⋅
Tweet on Outlaw Group using IRCBot, SSH bruteforce tool, port Scanner, and an XMRIG crypto miner for their hacking operation PerlBot |
2020-09-22
⋅
Bleeping Computer
⋅
Russian hackers use fake NATO training docs to breach govt networks Zebrocy APT28 |
2020-09-22
⋅
Graphika
⋅
Operation Naval Gazing: Facebook Takes Down Inauthentic Chinese Network |
2020-09-22
⋅
Facebook
⋅
Removing Coordinated Inauthentic Behavior |
2020-09-22
⋅
Trend Micro
⋅
Mispadu Banking Trojan Resurfaces Mispadu |
2020-09-21
⋅
⋅
Qianxin
⋅
Operation Tibo: A retaliatory targeted attack from the South Asian APT organization "Mo Luo Suo" AsyncRAT Darktrack RAT |
2020-09-21
⋅
Trend Micro
⋅
Cybercriminals Distribute Backdoor With VPN Installer NjRAT |
2020-09-18
⋅
KELA
⋅
The Initial Access Broker’s Toolbox – Remote Monitoring and Management |
2020-09-18
⋅
Medium cryptax
⋅
Locating the Trojan inside an infected COVID-19 contact tracing app Meterpreter |