Click here to download all references as Bib-File.•
2017-12-07
⋅
FireEye
⋅
New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit OilRig |
2017-12-05
⋅
Charming Kitten: Iranian Cyber Espionage Against Human Rights Activists, Academic Researchers and Media Outlets DownPaper |
2017-12-04
⋅
RSA
⋅
The Shadows of Ghosts Inside the response of a unique Carbanak intrusion GOTROJ MimiKatz |
2017-12-04
⋅
⋅
Macnica
⋅
New method of macro malware disguised as defense-related files RedLeaves |
2017-12-03
⋅
Malware Analysis - ROKRAT Unpacking from Injected Shellcode |
2017-11-28
⋅
RiskIQ
⋅
Gaffe Reveals Full List of Targets in Spear Phishing Attack Using Cobalt Strike Against Financial Institutions Cobalt |
2017-11-28
⋅
FireEye
⋅
Newly Observed Ursnif Variant Employs Malicious TLS Callback Technique to Achieve Process Injection ISFB |
2017-11-28
⋅
SentinelOne
⋅
OSX.CPUMEANER: New Cryptocurrency Mining Trojan Targets MacOS CpuMeaner |
2017-11-27
⋅
Blacklake
⋅
WHO WAS THE NSA CONTRACTOR ARRESTED FOR LEAKING THE ‘SHADOW BROKERS’ HACKING TOOLS? The Shadow Brokers |
2017-11-24
⋅
Bleeping Computer
⋅
Mirai Activity Picks up Once More After Publication of PoC Exploit Code Mirai |
2017-11-22
⋅
Flashpoint
⋅
Trickbot Gang Evolves, Incorporates Account Checking Into Hybrid Attack Model TrickBot |
2017-11-21
⋅
Let's Learn: Trickbot Socks5 Backconnect Module In Detail TrickBot |
2017-11-20
⋅
Trend Micro
⋅
Cobalt Strikes Again: Spam Runs Use Macros and CVE-2017-8759 Exploit Against Russian Banks More_eggs Cobalt |
2017-11-19
⋅
Arab News
⋅
Iranian agents blackmailed BBC reporter with ‘naked photo’ threats Charming Kitten |
2017-11-16
⋅
Github (mdsecactivebreach)
⋅
CACTUSTORCH: Payload Generation for Adversary Simulations CACTUSTORCH |
2017-11-15
⋅
Trend Micro
⋅
New EMOTET Hijacks a Windows API, Evades Sandbox and Analysis Emotet |
2017-11-14
⋅
Palo Alto Networks Unit 42
⋅
Muddying the Water: Targeted Attacks in the Middle East POWERSTATS MuddyWater |
2017-11-12
⋅
Vitali Kremez Blog
⋅
Let's Learn: Dissecting Golroted Trojan's Process Hollowing Technique & UAC Bypass in HKCU\Environment Golroted |
2017-11-09
⋅
Wired
⋅
He Perfected a Password-Hacking Tool—Then the Russians Came Calling MimiKatz |
2017-11-08
⋅
Reaqta
⋅
A short journey into DarkVNC attack chain DarkVNC |