Click here to download all references as Bib-File.•
2021-01-25
⋅
Trend Micro
⋅
Fake Office 365 Used for Phishing Attacks on C-Suite Targets |
2021-01-25
⋅
SOC Prime
⋅
Affiliates vs Hunters: Fighting the DarkSide DarkSide |
2021-01-25
⋅
Medium CSIS Techblog
⋅
The Nemty affiliate model Nemty |
2021-01-25
⋅
Twitter (@IntelAdvanced)
⋅
Tweet on Ryuk Ransomware group's post exploitation tactics including usage of Keethief tool Ryuk |
2021-01-24
⋅
malwareandstuff blog
⋅
Catching Debuggers with Section Hashing |
2021-01-24
⋅
Medium nasbench
⋅
Common Tools & Techniques Used By Threat Actors and Malware — Part I |
2021-01-24
⋅
Bleeping Computer
⋅
Another ransomware (Avaddon) now uses DDoS attacks to force victims to pay Avaddon |
2021-01-23
⋅
Youtube (MalwareAnalysisForHedgehogs)
⋅
Malware Analysis - Fileless GooLoad static analysis and unpacking |
2021-01-23
⋅
vxhive blog
⋅
Deep Dive Into SectopRat SectopRAT |
2021-01-22
⋅
Zscaler
⋅
DreamBus Botnet - Technical Analysis |
2021-01-22
⋅
DomainTools
⋅
Change in Perspective on the Utility of SUNBURST-related Network Indicators SUNBURST |
2021-01-22
⋅
Symantec
⋅
SolarWinds: How Sunburst Sends Data Back to the Attackers SUNBURST |
2021-01-21
⋅
NetbyteSEC
⋅
Solarwinds Attack: Sunburst's DLL Technical Analysis SUNBURST |
2021-01-21
⋅
⋅
360 Threat Intelligence Center
⋅
Disclosure of Manling Flower Organization (APT-C-08) using Warzone RAT attack Ave Maria |
2021-01-21
⋅
Sophos Labs
⋅
MrbMiner: Cryptojacking to bypass international sanctions |
2021-01-20
⋅
Trend Micro
⋅
XDR investigation uncovers PlugX, unique technique in APT attack PlugX |
2021-01-20
⋅
FireEye
⋅
Emulation of Kernel Mode Rootkits With Speakeasy Winnti |
2021-01-20
⋅
Medium walmartglobaltech
⋅
Anchor and Lazarus together again? Anchor TrickBot |
2021-01-20
⋅
Microsoft
⋅
Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop Cobalt Strike SUNBURST TEARDROP |
2021-01-19
⋅
Twitter (@ConfiantIntel)
⋅
Tweet on WizardUpdate macOS backdoor Vigram |