Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-06flareEstelle Ruellan, Oleg Lypko, Tammy Harper
Deciphering Black Basta’s Infrastructure from the Chat Leak
Black Basta Black Basta
2025-03-06Outpost24KrakenLabs
Unveiling EncryptHub: Analysis of a multi-stage malware campaign
Rhadamanthys
2025-03-06Palo Alto Networks Unit 42Janos Szurdi, Reethika Ramesh
The Next Level: Typo DGAs Used in Malicious Redirection Chains
2025-03-06Medium SarvivaMalwareAnalystsarviya
XWorm Attack Chain: Leveraging Steganography from Phishing Email to Keylogging via C2 Communication
XWorm
2025-03-05HUMANAdam Sell, Aviad Kaiserman, Gabi Cirlig, Inna Vasilyeva, Joao Marques, João Santos, Lindsay Kaye, Louisa Abel, Maor Elizen, Mikhail Venkov, Nico Agnese, Vikas Parthasarathy, Will Herbig
Satori Threat Intelligence Disruption: BADBOX 2.0 Targets Consumer Devices with Multiple Fraud Schemes
BADBOX
2025-03-05eSentireSpence Hutchinson
Initial Takeaways from the Black Basta Chat Leaks
Black Basta Black Basta
2025-03-05CyberScoopTim Starks
Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement
2025-03-05MicrosoftMicrosoft Threat Intelligence
Silk Typhoon targeting IT supply chain
2025-03-04K7 SecurityArun Kumar S, Dhanush
Tracking Emmenhtal
Emmenhtal
2025-03-04Medium (A-poc)A-poc
Black Basta Leak Analysis
Black Basta Black Basta
2025-03-04c/sideHimanshu Anand
Thousands of websites hit by four backdoors in 3rd party JavaScript attack
2025-03-04GeniansGenians
Analysis of Kimsuky Group association with emergency martial arts-themed APT attack
Quasar RAT
2025-03-04NisosNisos
Likely DPRK Network Backstops on GitHub, Targets Companies Globally
2025-03-04Department of JusticeU.S. Attorney's Office Southern District of New York
10 Chinese Nationals Charged With Large-Scale Hacking Of U.S. And International Victims On Behalf Of The Chinese Government
2025-03-04LinkedIn (Idan Tarab)Idan Tarab
Unmasking New Infrastructure: UAC-0184’s Espionage Activities
2025-03-04SecureworksSecureWorks
GOLD REBELLION
GOLD REBELLION
2025-03-03Trend MicroAdam O'Connor, Catherine Loveria, Gabriel Cardoso, Ian Kenefick, Jack Walsh, Jovit Samaniego, Lucas Silva, Stephen Carbery
Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal
Black Basta Black Basta Cactus ReedBed
2025-03-02ropgadget.comJeff White
Pivoting on Black Basta's (leaked) Infrastructure
Black Basta Black Basta
2025-03-01LeMagITValéry Rieß-Marchive
Ransomware : de REvil à Black Basta, que sait-on de Tramp ?
Black Basta Black Basta
2025-02-28Intel 471Intel 471
Black Basta exposed: A look at a cybercrime data leak
Black Basta Black Basta