Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-22Cert-UACert-UA
Uac-0026 cyberattack using HeaderTip malware (CERT-UA#4244)
HeaderTip
2022-03-22The RegisterJeff Burt
What does Go-written malware look like? Here's a sample under the microscope
Arid Gopher
2022-03-22Red CanaryRed Canary
2022 Threat Detection Report
FAKEUPDATES Silver Sparrow BazarBackdoor Cobalt Strike GootKit Yellow Cockatoo RAT
2022-03-22CybleincCyble
Hunters Become The Hunted: Clipper Malware Disguised As AvD Crypto Stealer
AvD Crypto Stealer
2022-03-22Cert-UACert-UA
Cyberattack on Ukrainian enterprises using the DoubleZero destructor program (CERT-UA # 4243)
DoubleZero
2022-03-22NVISO LabsDidier Stevens
Cobalt Strike: Overview – Part 7
Cobalt Strike
2022-03-22The Hacker NewsRavie Lakshmanan
Microsoft and Okta Confirm Breach by LAPSUS$ Extortion Group
RedLine Stealer
2022-03-22The RegisterJeff Burt
This is a BlackCat you don't want crossing your path
BlackCat BlackMatter
2022-03-22Bleeping ComputerLawrence Abrams
Microsoft confirms they were hacked by Lapsus$ extortion group
RedLine Stealer
2022-03-22VolexityDamien Cash, Steven Adair, Thomas Lancaster
Storm Cloud on the Horizon: GIMMICK Malware Strikes at macOS
GIMMICK GIMMICK
2022-03-21SOC PrimeAndrii Bezverkhyi
Vermin (UAC-0020) Hacking Collective Hits Ukrainian Government and Military with SPECTR Malware
Vermin UAC-0020
2022-03-21AvastAvast
IoC from Operation Dragon Castling
Proto8RAT TianWu
2022-03-21eSentireeSentire Threat Response Unit (TRU)
Conti Affiliate Exposed: New Domain Names, IP Addresses and Email Addresses Uncovered
HelloKitty BazarBackdoor Cobalt Strike Conti FiveHands HelloKitty IcedID
2022-03-21AhnLabASEC Analysis Team
BitRAT Disguised as Windows Product Key Verification Tool Being Distributed
BitRAT TinyNuke
2022-03-21IEEEAndreas Amann, John Fokker, Pierce Ryan, Sorcha Healy
Dynamics of Targeted Ransomware Negotiation
2022-03-21TesorionGijs Rijnders
Lorenz ransomware rebound: corruption and irrecoverable files
Lorenz
2022-03-21Github (trendmicro)Trend Micro Research
Python script to check a Cyclops Blink C&C
CyclopsBlink
2022-03-21ESET ResearchRene Holt
Sandworm: A tale of disruption told anew
2022-03-21eSentireeSentire
eSentire Threat Intelligence Malware Analysis: HermeticWiper & PartyTicket
HermeticWiper PartyTicket
2022-03-21DeepInstinctAsaf Gilboa, Simon Kenin
What is Arid Gopher? An Analysis of a New, Never-Before-Seen Malware Variant
Arid Gopher AridHelper