Click here to download all references as Bib-File.•
2022-03-24
⋅
ESET Research
⋅
Crypto malware in patched wallets targeting Android and iOS devices |
2022-03-24
⋅
Threat Post
⋅
Microsoft Help Files Disguise Vidar Malware Vidar |
2022-03-24
⋅
CSO Online
⋅
Microsoft help files repurposed to contain Vidar malware in new campaign Vidar |
2022-03-24
⋅
Trustwave
⋅
Vidar Malware Launcher Concealed in Help File Vidar |
2022-03-24
⋅
Cyber Security News
⋅
GIMMICK Malware Attacks macOS to Attack Organizations Across Asia GIMMICK |
2022-03-24
⋅
Bleeping Computer
⋅
Malicious Microsoft Excel add-ins used to deliver RAT malware JSSLoader |
2022-03-24
⋅
NextGov
⋅
Ukrainian Cyber Lead Says ‘At Least 4 Types of Malware’ in Use to Target Critical Infrastructure and Humanitarian Aid CaddyWiper DoubleZero HermeticWiper IsaacWiper |
2022-03-24
⋅
Recorded Future
⋅
IsaacWiper Continues Trend of Wiper Attacks Against Ukraine IsaacWiper |
2022-03-24
⋅
United States Senate
⋅
New Portman Report Demonstrates Threat Ransomware Presents to the United States REvil |
2022-03-24
⋅
United States Senate
⋅
America's Data Held Hostage: Case Studies in Ransomware Attacks on American Companies REvil |
2022-03-24
⋅
paloalto Netoworks: Unit42
⋅
Threat Brief: Lapsus$ Group RedLine Stealer |
2022-03-24
⋅
⋅
Medium s2wlab
⋅
Footsteps of the LAPSUS$ hacking group |
2022-03-23
⋅
⋅
EcuCert
⋅
APT-C-36 Advanced Persistent Threat Campaign Could be present in Ecuador NjRAT APT-C-36 |
2022-03-23
⋅
InfoSec Handlers Diary Blog
⋅
Arkei Variants: From Vidar to Mars Stealer Arkei Stealer Mars Stealer Oski Stealer Vidar |
2022-03-23
⋅
Trustwave
⋅
Trustwave’s Action Response: The Lapsus$ Hacker Group Shows Us the Importance of Securing the Digital Supply Chain |
2022-03-23
⋅
vmware
⋅
SysJoker – An Analysis of a Multi-OS RAT SysJoker SysJoker SysJoker |
2022-03-23
⋅
The Hacker News
⋅
abuse mikrotik router by GLUPTEBA malware Glupteba Proxy Glupteba |
2022-03-23
⋅
PythonBytes
⋅
Tracking cyber intruders with Jupyter and Python |
2022-03-23
⋅
Mandiant
⋅
Not So Lazarus: Mapping DPRK Cyber Threat Groups to Government Organizations |
2022-03-23
⋅
Secureworks
⋅
GOLD ULRICK Leaks Reveal Organizational Structure and Relationships Conti Emotet IcedID TrickBot |