Click here to download all references as Bib-File.•
2021-01-24
⋅
Medium nasbench
⋅
Common Tools & Techniques Used By Threat Actors and Malware — Part I |
2021-01-24
⋅
Bleeping Computer
⋅
Another ransomware (Avaddon) now uses DDoS attacks to force victims to pay Avaddon |
2021-01-23
⋅
Youtube (MalwareAnalysisForHedgehogs)
⋅
Malware Analysis - Fileless GooLoad static analysis and unpacking |
2021-01-22
⋅
Symantec
⋅
SolarWinds: How Sunburst Sends Data Back to the Attackers SUNBURST |
2021-01-21
⋅
NetbyteSEC
⋅
Solarwinds Attack: Sunburst's DLL Technical Analysis SUNBURST |
2021-01-21
⋅
⋅
360 Threat Intelligence Center
⋅
Disclosure of Manling Flower Organization (APT-C-08) using Warzone RAT attack Ave Maria |
2021-01-21
⋅
Sophos Labs
⋅
MrbMiner: Cryptojacking to bypass international sanctions |
2021-01-21
⋅
Sophos Labs
⋅
MrbMiner: Cryptojacking to bypass international sanctions |
2021-01-20
⋅
Trend Micro
⋅
XDR investigation uncovers PlugX, unique technique in APT attack PlugX |
2021-01-20
⋅
Trend Micro
⋅
XDR investigation uncovers PlugX, unique technique in APT attack PlugX |
2021-01-20
⋅
Trend Micro
⋅
XDR investigation uncovers PlugX, unique technique in APT attack PlugX |
2021-01-20
⋅
Microsoft
⋅
Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop Cobalt Strike SUNBURST TEARDROP |
2021-01-20
⋅
Microsoft
⋅
Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop Cobalt Strike SUNBURST TEARDROP |
2021-01-20
⋅
Microsoft
⋅
Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop Cobalt Strike SUNBURST TEARDROP |
2021-01-19
⋅
Twitter (@ConfiantIntel)
⋅
Tweet on WizardUpdate macOS backdoor Vigram |
2021-01-19
⋅
HP
⋅
Dridex Malicious Document Analysis: Automating the Extraction of Payload URLs Dridex |
2021-01-19
⋅
Malwarebytes
⋅
Malwarebytes targeted by Nation State Actor implicated in SolarWinds breach. Evidence suggests abuse of privileged access to Microsoft Office 365 and Azure environments |
2021-01-19
⋅
⋅
Twitter (@jpcert_ac)
⋅
Tweet on LODEINFO ver 0.47 spotted ITW targeting Japan LODEINFO |
2021-01-19
⋅
Medium elis531989
⋅
Funtastic Packers And Where To Find Them Get2 IcedID QakBot |
2021-01-19
⋅
⋅
JPCERT/CC
⋅
Tools used within the network invaded by attack group Lazarus |