Click here to download all references as Bib-File.•
2021-09-03
⋅
Trend Micro
⋅
The State of SSL/TLS Certificate Usage in Malware C&C Communications AdWind ostap AsyncRAT BazarBackdoor BitRAT Buer Chthonic CloudEyE Cobalt Strike DCRat Dridex FindPOS GootKit Gozi IcedID ISFB Nanocore RAT Orcus RAT PandaBanker Qadars QakBot Quasar RAT Rockloader ServHelper Shifu SManager TorrentLocker TrickBot Vawtrak Zeus Zloader |
2021-09-03
⋅
Twitter (@ESETresearch)
⋅
Twitter thread on SPARKLOG, a launcher component for PRIVATELOG along with STASHLOG PRIVATELOG STASHLOG |
2021-09-03
⋅
Seguranca Informatica
⋅
Netwalker ransomware full analysis Mailto |
2021-09-03
⋅
IBM
⋅
Dissecting Sodinokibi Ransomware Attacks: Bringing Incident Response and Intelligence Together in the Fight Valak QakBot REvil |
2021-09-03
⋅
Sophos
⋅
Conti affiliates use ProxyShell Exchange exploit in ransomware attacks Cobalt Strike Conti |
2021-09-02
⋅
Mandiant
⋅
Advanced Persistent Threats (APTs) APT9 |
2021-09-02
⋅
⋅
AhnLab
⋅
Attacks using metasploit meterpreter Appleseed Meterpreter |
2021-09-02
⋅
MalwareBookReports
⋅
Cross-Platform Java Dropper: Snake and XLoader (Mac Version) Xloader 404 Keylogger |
2021-09-02
⋅
LIFARS
⋅
Vjw0rm Worm/RAT Vjw0rm |
2021-09-02
⋅
US Department of Health and Human Services
⋅
Demystifying BlackMatter BlackMatter BlackMatter DarkSide |
2021-09-02
⋅
⋅
KrCert
⋅
TTPs#6 Targeted Watering Hole Attack Strategy Analysis (SILENT CHOLLIMA) Tiger RAT |
2021-09-02
⋅
nviso
⋅
Anatomy and Disruption of Metasploit Shellcode |
2021-09-02
⋅
Twitter (@th3_protoCOL)
⋅
Tweet on Confluence Server exploitation (CVE-2021-26084) in the wild and cobaltsrike activity (mentioned in replies by GaborSzappanos) Cobalt Strike |
2021-09-02
⋅
Juniper
⋅
Attacks Continue Against Realtek Vulnerabilities Dark |
2021-09-02
⋅
Bleeping Computer
⋅
Autodesk reveals it was targeted by Russian SolarWinds hackers SUNBURST |
2021-09-02
⋅
Talos
⋅
Translated: Talos' insights from the recently leaked Conti ransomware playbook Conti |
2021-09-01
⋅
YouTube (Black Hat)
⋅
Threat Hunting in Active Directory Environment |
2021-09-01
⋅
YouTube (Black Hat)
⋅
Domain Borrowing: Catch My C2 Traffic if You Can |
2021-09-01
⋅
YouTube (Black Hat)
⋅
Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network Cobalt Strike PlugX Waterbear |
2021-09-01
⋅
YouTube (Black Hat)
⋅
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover? Cerber Pony |