Click here to download all references as Bib-File.•
2022-01-07
⋅
Malwarebytes
⋅
Patchwork APT caught in its own web BadNews |
2022-01-06
⋅
Cyber And Ramen blog
⋅
A “GULP” of PlugX PlugX |
2022-01-06
⋅
muha2xmad
⋅
Unpacking Emotet malware part 01 Emotet |
2022-01-06
⋅
Night Sky is the latest ransomware targeting corporate networks NightSky |
2022-01-06
⋅
Chuongdong blog
⋅
Rook Ransomware Analysis Rook |
2022-01-06
⋅
Sekoia
⋅
NOBELIUM’s EnvyScout infection chain goes in the registry, targeting embassies Cobalt Strike EnvyScout |
2022-01-05
⋅
AhnLab
⋅
Analysis Report on Kimsuky Group’s APT Attacks (AppleSeed, PebbleDash) Appleseed Kimsuky PEBBLEDASH |
2022-01-05
⋅
Lumen
⋅
New Konni Campaign Kicks Off the New Year by Targeting Russian Ministry of Foreign Affairs Konni |
2022-01-05
⋅
VMRay
⋅
Malware Analysis Spotlight: Kuzuluy Phishing Kit |
2022-01-05
⋅
Check Point
⋅
Can You Trust a File’s Digital Signature? New Zloader Campaign exploits Microsoft’s Signature Verification putting users at risk Zloader |
2022-01-05
⋅
SYGNIA
⋅
Elephant Beetle: Uncovering an Organized Financial-Theft Operation FIN13 |
2022-01-04
⋅
Microsoft
⋅
Leveraging the Power of KQL in Incident Response |
2022-01-04
⋅
forensicitguy
⋅
Extracting Indicators from a Packed Mirai Sample Mirai |
2022-01-03
⋅
Cluster25
⋅
North Korean Group “KONNI” Targets The Russian Diplomatic Sector With New Versions Of Malware Implants Konni |
2022-01-03
⋅
AhnLab
⋅
Distribution of Redline Stealer Disguised as Software Crack DanaBot RedLine Stealer Vidar |
2022-01-03
⋅
MinervaLabs
⋅
Malicious Telegram Installer Drops Purple Fox Rootkit PurpleFox |
2022-01-02
⋅
Atomic Matryoshka
⋅
"Cracking Open the Malware Piñata" Series: Intro to Dynamic Analysis with RedLineStealer RedLine Stealer |
2022-01-02
⋅
BleepingComputer
⋅
Malicious CSV text files used to install BazarBackdoor malware BazarBackdoor |
2022-01-02
⋅
forensicitguy
⋅
Analyzing a Magnitude EK Appx Package Dropping Magniber Magniber |
2022-01-02
⋅
SBIDIOT IoT Malware: miner edition SBIDIOT |