Click here to download all references as Bib-File.•
2022-03-08
⋅
Medium (Cryptax)
⋅
Live reverse engineering of a trojanized medical app — Android/Joker Joker |
2022-03-08
⋅
Springer
⋅
Mobile Forensics – The File Format Handbook |
2022-03-08
⋅
Team Cymru
⋅
Record breaking DDoS Potential Discovered: CVE-2022-26143 |
2022-03-08
⋅
Secureworks
⋅
Excel Add-ins Deliver JSSLoader Malware JSSLoader |
2022-03-08
⋅
Recorded Future
⋅
The Media Environment and Domestic Public Opinion in China Toward Russia’s War On Ukraine |
2022-03-08
⋅
Twitter (@CyberJack42)
⋅
Tweet on ELFSHELF alias for KEYPLUG KEYPLUG |
2022-03-08
⋅
⋅
MBSD
⋅
ContiLeaks Conti |
2022-03-08
⋅
Symantec
⋅
Daxin Backdoor: In-Depth Analysis, Part One Daxin |
2022-03-08
⋅
Lumen
⋅
What Global Network Visibility Reveals about the Resurgence of One of the World’s Most Notorious Botnets Emotet |
2022-03-08
⋅
Yoroi
⋅
Conti Ransomware source code: a well-designed COTS ransomware Conti |
2022-03-08
⋅
The Record
⋅
Inside Conti leaks: The Panama Papers of ransomware Conti |
2022-03-08
⋅
Cluster25
⋅
GhostWriter / UNC1151 adopts MicroBackdoor Variants in Cyber Operations against Ukraine MicroBackdoor |
2022-03-08
⋅
Trend Micro
⋅
New RURansom Wiper Targets Russia RURansom |
2022-03-08
⋅
Github (whichbuffer)
⋅
Conti-Ransomware-IOC Conti |
2022-03-08
⋅
Twitter (@ShaneHuntley)
⋅
Tweet on APT31 phishing campaign targeting high profile Gmail users affiliated with the U.S. government in February |
2022-03-08
⋅
Cylera
⋅
The link between Kwampirs (Orangeworm) and Shamoon APTs DistTrack Kwampirs |
2022-03-08
⋅
Mandiant
⋅
Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments KEYPLUG Cobalt Strike LOWKEY |
2022-03-08
⋅
Twitter (@struppigel)
⋅
Tweet on KazyLoader KazyLoader |
2022-03-07
⋅
⋅
LAC WATCH
⋅
I CAN'T HEAR YOU NOW! INTERNAL BEHAVIOR OF INFORMATION-STEALING MALWARE AND JSOC DETECTION TRENDS Xloader Agent Tesla Formbook Loki Password Stealer (PWS) |
2022-03-07
⋅
Check Point Research
⋅
Lapsus$ Ransomware gang uses stolen source code to disguise malware files as trustworthy. Check Point customers remain protected LAPSUS |