Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-06-24ESET ResearchLukáš Štefanko
New ransomware posing as COVID‑19 tracing app targets Canada; ESET offers decryptor
CryCryptor
2020-06-23Kaspersky LabsAlexander Eremin
Oh, what a boot-iful mornin’ Rovnix bootkit back in business
Rovnix
2020-06-23SymantecCritical Attack Discovery and Intelligence Team
Sodinokibi: Ransomware Attackers also Scanning for PoS Software, Leveraging Cobalt Strike
Cobalt Strike REvil
2020-06-22MalwareLab.plMaciej Kotowicz
VenomRAT - new, hackforums grade, reincarnation of QuassarRAT
Quasar RAT Venom RAT
2020-06-22zero2autoDaniel Bunce
Unpacking Visual Basic Packers – IcedID
IcedID
2020-06-22wietzebeukema.nlWietze Beukema
Hijacking DLLs in Windows
2020-06-22CERT-FRCERT-FR
Évolution De Lactivité du Groupe Cybercriminel TA505
Amadey AndroMut Bart Clop Dridex FlawedGrace Gandcrab Get2 GlobeImposter Jaff Locky Marap Philadephia Ransom QuantLoader Scarab Ransomware SDBbot ServHelper Silence tRat TrickBot
2020-06-22Sentinel LABSJason Reaves, Joshua Platt
Inside a TrickBot Cobalt Strike Attack Server
Cobalt Strike TrickBot
2020-06-22FindingBad BlogspotJack Crook
Dynamic Correlation, ML and Hunting
2020-06-19ACSCAustralian Cyber Security Centre (ACSC)
Copy-paste compromises
Copy-Paste
2020-06-19Australian Signals DirectorateAustralian Cyber Security Centre (ACSC)
Advisory 2020-008: Copy-paste compromises - tactics, techniques and procedures used to target multiple Australian networks
Copy-Paste
2020-06-19Youtube (Raphael Mudge)Raphael Mudge
Beacon Object Files - Luser Demo
Cobalt Strike
2020-06-19ZscalerAtinderpal Singh, Nirmal Singh, Sahil Antil
Targeted Attack Leverages India-China Border Dispute to Lure Victims
Cobalt Strike
2020-06-19Positive TechnologiesAlexey Vishnyakov
The eagle eye is back: old and new backdoors from APT30
backspace NETEAGLE RCtrl RHttpCtrl APT30
2020-06-18MicrosoftMicrosoft Threat Protection Intelligence Team
Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint (APT33/HOLMIUM)
POWERTON
2020-06-18Australian Cyber Security CentreAustralian Cyber Security Centre (ACSC)
Advisory 2020-008: Copy-Paste Compromises –tactics, techniques and procedures used to target multiple Australian networks
TwoFace Cobalt Strike Empire Downloader
2020-06-17MalwarebytesHossein Jazi, Jérôme Segura
Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature
Cobalt Strike
2020-06-17SentinelOneMichael Myngerbayev
A Click from the Backyard | Analysis of CVE-2020-9332, a Vulnerable USB Redirection Software
2020-06-17Kaspersky LabsKaspersky Lab ICS CERT
Targeted attacks on industrial companies using Snake ransomware
Snake
2020-06-17CognizantCognizant
Notice of Data Breach
Maze