Click here to download all references as Bib-File.•
2021-01-27
⋅
AT&T
⋅
TeamTNT delivers malware with new detection evasion tool TeamTNT TeamTNT |
2021-01-27
⋅
S2W LAB Inc.
⋅
How to communicate between RAT infected devices (White paper) Volgmer |
2021-01-27
⋅
S2W LAB Inc.
⋅
Analysis of THREATNEEDLE C&C Communication (feat. Google TAG Warning to Researchers) Volgmer |
2021-01-26
⋅
SophosLabs Uncut
⋅
Nefilim Ransomware Attack Uses “Ghost” Credentials Nefilim |
2021-01-26
⋅
Digital Shadows
⋅
Ransomware: Analyzing the data from 2020 |
2021-01-26
⋅
Medium cycrafttechnology
⋅
Threat Attribution — Chimera "Under the Radar" |
2021-01-26
⋅
FireEye
⋅
Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication |
2021-01-26
⋅
Team Cymru
⋅
GhostDNSbusters (Part 3) Illuminating GhostDNS Infrastructure |
2021-01-26
⋅
Twitter (@swisscom_csirt)
⋅
Tweet on Cring Ransomware groups using customized Mimikatz sample followed by CobaltStrike and dropping Cring rasomware Cobalt Strike Cring MimiKatz |
2021-01-26
⋅
IBM
⋅
TrickBot’s Survival Instinct Prevails — What’s Different About the TrickBoot Version? TrickBot |
2021-01-26
⋅
Comae
⋅
PANDORABOX - North Koreans target security researchers ComeBacker |
2021-01-26
⋅
Mimecast
⋅
Important Security Update SUNBURST |
2021-01-26
⋅
Bleeping Computer
⋅
Mimecast links security breach to SolarWinds hackers SUNBURST |
2021-01-26
⋅
JPCERT/CC
⋅
Operation Dream Job by Lazarus LCPDot Torisma Lazarus Group |
2021-01-26
⋅
⋅
360 Threat Intelligence Center
⋅
Shell Break-Lazarus (APT-C-26) organized targeted attacks against security researchers to reveal the secret |
2021-01-26
⋅
⋅
Anheng Threat Intelligence Center
⋅
Undefeated, hackers use Visual Studio compiler features to target binary vulnerabilities security researcher |
2021-01-26
⋅
Trend Micro
⋅
Examining a Sodinokibi Attack REvil |
2021-01-26
⋅
Medium 0xthreatintel
⋅
Reversing APT Tool : SManager (Unpacked) SManager |
2021-01-25
⋅
⋅
Cert-AgID
⋅
Individuato sito che veicola in Italia un APK malevolo Oscorp |
2021-01-25
⋅
xorl %eax
⋅
On attribution: APT28, APT29…Turla: No, they are NOT the same |