Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-02-18IntezerIntezer
TeamTNT Cryptomining Explosion
TeamTNT
2022-02-18Recorded FutureInsikt Group®
Executive Overview of Russian Aggression Against Ukraine
2022-02-18Kookmin UniversityGiyoon Kim, Jongsung Kim, Soojin Kang, Soram Kim
A Method for Decrypting Data Infected with Hive Ransomware
Hive Hive
2022-02-18ReutersChristopher Bing, Joel Schectman
How a Saudi woman's iPhone revealed hacking around the world
Chrysaor
2022-02-18The RecordCatalin Cimpanu
Academics publish method for recovering data encrypted by the Hive ransomware
Hive Hive
2022-02-18Bleeping ComputerIonut Ilascu
Conti ransomware gang takes over TrickBot malware operation
Conti TrickBot
2022-02-18YouTube (John Hammond)John Hammond
Uncovering NETWIRE Malware - Discovery & Deobfuscation
NetWire RC
2022-02-18AhnLabASEC Analysis Team
PseudoManuscrypt Being Distributed in the Same Method as Cryptbot
CryptBot PseudoManuscrypt
2022-02-18SANS ISCXavier Mertens
Remcos RAT Delivered Through Double Compressed Archive
Remcos
2022-02-17enigmasoftCagedTech
Nwgen Ransomware
Storm-0829
2022-02-17Github (albertzsigovits)Albert Zsigovits
Ransomware Windows DarkBit
DarkBit
2022-02-17Github (Finch4)Finch
GoSteal Analysis
2022-02-17CloudsekAnandeshwar Unnikrishnan, Hansika Saxena
Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2)
Blister
2022-02-17SinaCyberAdam Kozy
Testimony before the U.S.-China Economic and Security Review Commission Hearing on “China’s Cyber Capabilities: Warfare, Espionage, and Implications for the United States”
PlugX APT26 APT41
2022-02-17ZscalerAditya Sharma, Stuti Chaturvedi
FreeCryptoScam - A New Cryptocurrency Scam That Leads to Installation of Backdoors and Stealers
DCRat
2022-02-17Sekoiasekoia
The story of a ransomware builder: from Thanos to Spook and beyond (Part 1)
Hakbit
2022-02-17TrellixChristiaan Beek, Marc Elias
Looking over the nation-state actors’ shoulders: Even they have a difficult day sometimes
Empire Downloader
2022-02-17BlackberryBlackBerry Research & Intelligence Team
Threat Thursday: Arkei Infostealer Expands Reach Using SmokeLoader to Target Crypto Wallets and MFA
Arkei Stealer SmokeLoader
2022-02-17NCC GroupMichael Mullen, Richard Footman, Simon Biggs
Detecting Karakurt – an extortion focused threat actor
2022-02-17SentinelOneAmitai Ben, Shushan Ehrlich
Log4j2 In The Wild | Iranian-Aligned Threat Actor “TunnelVision” Actively Exploiting VMware Horizon
APT35