Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-11Bleeping ComputerIonut Ilascu
LockBit ransomware gang claims attack on Bridgestone Americas
LockBit
2022-03-11Security BoulevardTeri Robinson
IsaacWiper Followed HermeticWiper Attack on Ukraine Orgs
HermeticWiper IsaacWiper
2022-03-11Cert-UA
Cyberattack on Ukrainian state authorities using the Cobalt Strike Beacon (CERT-UA#4145)
Cobalt Strike
2022-03-11Black Hat Ethical Hacking
Malware Posing as Russia DDoS Tool Bites Ukraine Hackers
2022-03-10BlackberryThe BlackBerry Research & Intelligence Team
Threat Thursday: CryptBot Infostealer Masquerades as Cracked Software
CryptBot
2022-03-10TalosArnaud Zobec, Asheer Malhotra, Vitor Ventura
Iranian linked conglomerate MuddyWater comprised of regionally focused subgroups
STARWHALE
2022-03-10BrandefenseBrandefense
HermeticWiper - Technical Analysis Report
HermeticWiper
2022-03-10BrightTALK (Kaspersky GReAT)Costin Raiu, Dan Demeter, Ivan Kwiatkowski, Kurt Baumgartner, Marco Preuss
BrightTALK: A look at current cyberattacks in Ukraine
HermeticWiper HermeticWizard IsaacWiper PartyTicket WhisperGate
2022-03-10splunkSplunk Threat Research Team
Detecting HermeticWiper
HermeticWiper PartyTicket
2022-03-10Recorded FutureInsikt Group®
Inside China’s National Defense Mobilization Reform: Capacity Surveys, Mobilization Resources, and “New-Type” Militias
2022-03-10RootdemonRootdaemon
Iranian Hackers Targeting Turkey and Arabian Peninsula in New Malware Campaign
STARWHALE
2022-03-10SecurityScorecardRyan Slaney
SecurityScorecard Discovers new botnet, ‘Zhadnost,’ responsible for Ukraine DDoS attacks
2022-03-10cybleCyble
AbereBot Returns as Escobar
Aberebot
2022-03-10Twitter (@Katechondic)Katechondic
Tweet on additional computer names "desktop-g1i8n3f" & "desktop-j6llo2k", seen with Crimson RAT C2 infrastructure used by APT36
Crimson RAT
2022-03-10Twitter (@teamcymru_S2)Team Cymru
Tweet on Crimson RAT infrastructure used by APT36
Crimson RAT
2022-03-10Check Point Research
Leaks of Conti Ransomware Group Paint Picture of a Surprisingly Normal Tech Start-Up… Sort Of
Conti
2022-03-10Cisco TalosChris Neal
WEDNESDAY, MARCH 9, 2022 Threat advisory: Cybercriminals compromise users with malware disguised as pro-Ukraine cyber tools
2022-03-10TechRepublicBrian Stone
MuddyWater targets Middle Eastern and Asian countries in phishing attacks
STARWHALE
2022-03-10Bleeping ComputerBill Toulas
Corporate website contact forms used to spread BazarBackdoor malware
BazarBackdoor
2022-03-10Medium walmartglobaltechJason Reaves, Joshua Platt
Diavol the Enigma of Ransomware
Diavol