Click here to download all references as Bib-File.•
2020-06-22
⋅
FindingBad Blogspot
⋅
Dynamic Correlation, ML and Hunting |
2020-06-19
⋅
ACSC
⋅
Copy-paste compromises Copy-Paste |
2020-06-19
⋅
Australian Signals Directorate
⋅
Advisory 2020-008: Copy-paste compromises - tactics, techniques and procedures used to target multiple Australian networks Copy-Paste |
2020-06-19
⋅
Youtube (Raphael Mudge)
⋅
Beacon Object Files - Luser Demo Cobalt Strike |
2020-06-19
⋅
Zscaler
⋅
Targeted Attack Leverages India-China Border Dispute to Lure Victims Cobalt Strike |
2020-06-19
⋅
Positive Technologies
⋅
The eagle eye is back: old and new backdoors from APT30 backspace NETEAGLE RCtrl RHttpCtrl APT30 |
2020-06-18
⋅
Microsoft
⋅
Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint (APT33/HOLMIUM) POWERTON |
2020-06-18
⋅
Australian Cyber Security Centre
⋅
Advisory 2020-008: Copy-Paste Compromises –tactics, techniques and procedures used to target multiple Australian networks TwoFace Cobalt Strike Empire Downloader |
2020-06-17
⋅
Malwarebytes
⋅
Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature Cobalt Strike |
2020-06-17
⋅
SentinelOne
⋅
A Click from the Backyard | Analysis of CVE-2020-9332, a Vulnerable USB Redirection Software |
2020-06-17
⋅
Kaspersky Labs
⋅
Targeted attacks on industrial companies using Snake ransomware Snake |
2020-06-17
⋅
Cognizant
⋅
Notice of Data Breach Maze |
2020-06-17
⋅
Twitter (@MsftSecIntel)
⋅
A tweet thread on TA505 using CAPTCHA to avoid detection and infecting victims with FlawedGrace FlawedGrace |
2020-06-17
⋅
Github (f0wl)
⋅
deICEr: A Go tool for extracting config from IcedID second stage Loaders IcedID |
2020-06-17
⋅
paloalto Networks Unit 42
⋅
AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations AcidBox |
2020-06-17
⋅
ESET Research
⋅
Operation In(ter)ception: Targeted Attacks against European Aerospace and Military Companies Interception |
2020-06-16
⋅
New Zealand CERT
⋅
Active ransomware campaign leveraging remote access technologies Nefilim |
2020-06-16
⋅
BleepingComputer
⋅
Chipmaker MaxLinear reports data breach after Maze Ransomware attack Maze |
2020-06-16
⋅
PTSecurity
⋅
Cobalt: tactics and tools update CobInt |
2020-06-16
⋅
Morphisec
⋅
CrystalBit / Apple Double DLL Hijack -- From fraudulent software bundle downloads to an evasive miner raging campaign |