Click here to download all references as Bib-File.•
2022-05-12
⋅
Red Canary
⋅
The Goot cause: Detecting Gootloader and its follow-on activity GootLoader Cobalt Strike |
2022-05-12
⋅
Red Canary
⋅
Gootloader and Cobalt Strike malware analysis GootLoader Cobalt Strike |
2022-05-11
⋅
TEAMT5
⋅
To loot or Not to Loot? That Is Not a Question - When State-Nexus APT Targets Online Entertainment Industry APT27 BRONZE STARLIGHT SLIME29 TianWu |
2022-05-11
⋅
The Hacker News
⋅
Bitter APT Hackers Add Bangladesh to Their List of Targets in South Asia |
2022-05-11
⋅
ExaTrack
⋅
Tricephalic Hellkeeper: a tale of a passive backdoor BPFDoor Bvp47 Uroburos |
2022-05-11
⋅
NTT Security Holdings
⋅
Analysis of an Iranian APTs “E400” PowGoop Variant Reveals Dozens of Control Servers Dating Back to 2020 PowGoop |
2022-05-11
⋅
Fortinet
⋅
Please Confirm You Received Our APT Saitama Backdoor |
2022-05-11
⋅
Kaspersky
⋅
New ransomware trends in 2022 BlackCat Conti DEADBOLT DoubleZero LockBit PartyTicket StealBit |
2022-05-11
⋅
IronNet
⋅
Detecting a MUMMY SPIDER campaign and Emotet infection Emotet |
2022-05-11
⋅
SANS ISC
⋅
TA578 using thread-hijacked emails to push ISO files for Bumblebee malware BumbleBee |
2022-05-11
⋅
K7 Security
⋅
Transparent Tribe Targets Educational Institution Crimson RAT |
2022-05-11
⋅
HP
⋅
Threat Insights Report Q1 - 2022 AsyncRAT Emotet Mekotio Vjw0rm |
2022-05-11
⋅
Cisco Talos
⋅
Bitter APT adds Bangladesh to their targets AndroRAT Artra Downloader Bitter RAT ZxxZ |
2022-05-11
⋅
InfoSec Handlers Diary Blog
⋅
TA578 using thread-hijacked emails to push ISO files for Bumblebee malware BumbleBee Cobalt Strike IcedID PhotoLoader |
2022-05-11
⋅
Sandfly Security
⋅
BPFDoor - An Evasive Linux Backdoor Technical Analysis BPFDoor |
2022-05-11
⋅
Proofpoint
⋅
Nerbian RAT Using COVID-19 Themes Features Sophisticated Evasion Techniques Nerbian RAT |
2022-05-11
⋅
⋅
NTT
⋅
Operation RestyLink: Targeted attack campaign targeting Japanese companies Cobalt Strike |
2022-05-11
⋅
CrowdStrike
⋅
IceApple: A Novel Internet Information Services (IIS) Post-Exploitation Framework |
2022-05-11
⋅
CrowdStrike
⋅
Proactive Threat Hunting Bears Fruit: Falcon OverWatch Detects Novel IceApple Post-Exploitation Framework |
2022-05-10
⋅
Marco Ramilli's Blog
⋅
A Malware Analysis in RU-AU conflict Cobalt Strike |