Click here to download all references as Bib-File.•
2022-05-11
⋅
InfoSec Handlers Diary Blog
⋅
TA578 using thread-hijacked emails to push ISO files for Bumblebee malware BumbleBee Cobalt Strike IcedID PhotoLoader |
2022-05-11
⋅
Sandfly Security
⋅
BPFDoor - An Evasive Linux Backdoor Technical Analysis BPFDoor |
2022-05-11
⋅
Proofpoint
⋅
Nerbian RAT Using COVID-19 Themes Features Sophisticated Evasion Techniques Nerbian RAT |
2022-05-11
⋅
⋅
NTT
⋅
Operation RestyLink: Targeted attack campaign targeting Japanese companies Cobalt Strike |
2022-05-11
⋅
CrowdStrike
⋅
IceApple: A Novel Internet Information Services (IIS) Post-Exploitation Framework |
2022-05-11
⋅
CrowdStrike
⋅
Proactive Threat Hunting Bears Fruit: Falcon OverWatch Detects Novel IceApple Post-Exploitation Framework |
2022-05-10
⋅
Marco Ramilli's Blog
⋅
A Malware Analysis in RU-AU conflict Cobalt Strike |
2022-05-10
⋅
eSentire
⋅
Redline Stealer Masquerades as Photo Editing Software RedLine Stealer |
2022-05-10
⋅
RiskIQ
⋅
RiskIQ: VBScript Hosted on BlogSpot URL Deploys Malware Associated with NyanCat |
2022-05-10
⋅
RiskIQ
⋅
Commodity Skimming & Magecart Trends in First Quarter of 2022 magecart |
2022-05-10
⋅
RiskIQ
⋅
RiskIQ: Identifying Dridex C2 via SSL Certificate Patterns Dridex |
2022-05-10
⋅
Checkpoint
⋅
Info-stealer Campaign targets German Car Dealerships and Manufacturers Azorult BitRAT Raccoon |
2022-05-10
⋅
Malwarebytes Labs
⋅
APT34 targets Jordan Government using new Saitama backdoor Saitama Backdoor |
2022-05-10
⋅
Github (SrujanKumar-K)
⋅
Malicious PDF Document Analysis - Lazyscripter Lazyscripter |
2022-05-09
⋅
XenArmor
⋅
XenArmor | Windows Security & Password Recovery Software XenArmor |
2022-05-09
⋅
cocomelonc
⋅
Malware development: persistence - part 4. Windows services. Simple C++ example. Anchor AppleJeus Attor BBSRAT BlackEnergy Carbanak Cobalt Strike DuQu |
2022-05-09
⋅
The DFIR Report
⋅
SEO Poisoning – A Gootloader Story GootLoader LaZagne Cobalt Strike GootKit |
2022-05-09
⋅
Microsoft Security
⋅
Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself Griffon BazarBackdoor BlackCat BlackMatter Blister Gozi LockBit Pandora Rook SystemBC TrickBot |
2022-05-09
⋅
⋅
360 netlab
⋅
The data analysis behind the cyber attack on Beijing Healthbao |
2022-05-09
⋅
InfoSec Handlers Diary Blog
⋅
Octopus Backdoor is Back with a New Embedded Obfuscated Bat File Octopus |