Click here to download all references as Bib-File.•
2024-02-29
⋅
Vipyr Security
⋅
Novel ELF64 Remote Access Tool Embedded in Malicious PyPI Uploads SimpleTea |
2024-02-29
⋅
CrowdStrike
⋅
The Anatomy of an ALPHA SPIDER Ransomware Attack BlackCat Alpha Spider |
2024-02-29
⋅
StrikeReady
⋅
Don't get BITTER about being targeted -- fight back with the help of the community. Bitter RAT |
2024-02-28
⋅
EchoCTI
⋅
Raccoon Stealer V2.0 Technical Analysis Raccoon |
2024-02-27
⋅
Mandiant
⋅
When Cats Fly: Suspected Iranian Threat Actor UNC1549 Targets Israeli and Middle East Aerospace and Defense Sectors LIGHTRAIL MINIBIKE MINIBUS UNC1549 |
2024-02-27
⋅
Doubleagent.net
⋅
GTPDOOR - A novel backdoor tailored for covert access over the roaming exchange GTPDOOR |
2024-02-27
⋅
US Department of Defense
⋅
Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations MooBot |
2024-02-26
⋅
Twitter (@embee_research)
⋅
Advanced CyberChef Techniques for Configuration Extraction - Detailed Walkthrough and Examples NetSupportManager RAT |
2024-02-26
⋅
NCSC UK
⋅
SVR cyber actors adapt tactics for initial cloud access |
2024-02-25
⋅
YouTube (Embee Research)
⋅
My Longest CyberChef Recipe Ever - 22 Operation Configuration Extractor NetSupportManager RAT |
2024-02-23
⋅
Cyfirma
⋅
Xeno RAT: A New Remote Access Trojan with Advance Capabilities XenoRAT |
2024-02-21
⋅
YouTube (SentinelOne)
⋅
LABSCon23 Replay | Chasing Shadows | The rise of a prolific espionage actor 9002 RAT PlugX ShadowPad Spyder Earth Lusca |
2024-02-21
⋅
DCSO
⋅
To Russia With Love: Assessing a KONNI-Backdoored Suspected Russian Consular Software Installer Konni |
2024-02-20
⋅
ANY.RUN
⋅
Understanding Macros in Malware: Types, Capabilities, Case Study |
2024-02-19
⋅
AhnLab
⋅
Analysis of Nood RAT Used in Attacks Against Linux (Gh0st RAT’s Variant) Nood RAT |
2024-02-19
⋅
Lab52
⋅
Pelmeni Wrapper: New Wrapper of Kazuar (Turla Backdoor) Pelmeni |
2024-02-19
⋅
ThreatFabric
⋅
Anatsa Trojan Returns: Targeting Europe and Expanding Its Reach Anatsa |
2024-02-19
⋅
Cyber Geeks
⋅
A Technical Analysis of the BackMyData Ransomware Used to Attack Hospitals in Romania Phobos |
2024-02-16
⋅
YouTube (CactusCon)
⋅
Reverse Engineering Go Malware: A BianLian Story BianLian BianLian |
2024-02-16
⋅
Malcat
⋅
Writing a Qakbot 5.0 config extractor with Malcat QakBot |