Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-03-07Trend MicroCedric Pernet, Daniel Lunghi, Jaromír Hořejší, Joseph Chen
New SLUB Backdoor Uses GitHub, Communicates via Slack
SLUB
2019-01-31LumenBlack Lotus Labs
A New Phase Of TheMoon
TheMoon
2019-01-18Mark Edmondson
BLACK ENERGY – Analysis
BlackEnergy
2019-01-17Bleeping ComputerLawrence Abrams
BlackRouter Ransomware Promoted as a RaaS by Iranian Developer
BlackRouter
2019-01-04Github (BlackHacker511)BlackHacker511
Github Repository: BlackNET
BlackNET RAT
2019-01-01Council on Foreign RelationsCyber Operations Tracker
Black Energy
Sandworm
2019-01-01MITREMITRE ATT&CK
Group description: BlackOasis
BlackOasis
2019-01-01MITREMITRE ATT&CK
Tool description: BLACKCOFFEE
BLACKCOFFEE
2018-11-15CenturylinkLabsBlack Lotus Labs
Mylobot Continues Global Infections
MyloBot
2018-10-18ESET ResearchAnton Cherepanov
GREYENERGY: A successor to BlackEnergy
Felixroot GreyEnergy
2018-10-01FireEyeAdrian Bataille, Matias Bevilacqua
Hunting for PLATINUM
REDSALT
2018-08-18Bleeping ComputerVishal Thakur
AZORult Trojan Serving Aurora Ransomware by MalActor Oktropys
Aurora Azorult
2018-07-17Trend MicroJoey Chen
Blackgear Cyberespionage Campaign Resurfaces, Abuses Social Media for C&C Communication
Blackgear
2018-07-10Carbon BlackJared Myers
Carbon Black TAU Threat Analysis: Recent Dharma Ransomware Highlights Attackers’ Continued Use of Open-Source Tools
Dharma
2018-07-03CywareSamantha Black
Iranian APT Charming Kitten impersonates ClearSky, the security firm that uncovered its campaigns
Charming Kitten
2018-06-14LACCyber ​​Emergency Center
Cyber ​​Emergency Center Report No. 3
WellMess
2018-06-08JPCERT/CCShusei Tomonaga
PLEAD Downloader Used by BlackTech
PLEAD
2018-05-21LACYoshihiro Ishikawa
Confirmed new attacks by APT attacker group menuPass (APT10)
Cobalt Strike
2018-02-28AcronisRavikant Tiwari
Black Ruby: Combining Ransomware and Coin Miner Malware
Blackruby
2018-02-27VMWare Carbon BlackJared Myers
Threat Analysis: ROKRAT Malware
RokRAT