Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-01Nozomi NetworksNozomi Networks Labs
How IoT Botnets Evade Detection and Analysis
Mozi SBIDIOT
2022-03-01RiskIQJennifer Grob
RiskIQ: Fraudulent Website Spoofing UNHCR for Ukrainian Refugees Seeks Bitcoin Donations
2022-03-01CybereasonOhav Peri, Tom Fakterman
Cybereason vs. BlackCat Ransomware
BlackCat
2022-03-01Github (0xZuk0)Dipankar Lama
Malware Analysis Report: WannaCry Ransomware
WannaCryptor
2022-03-01Huntress LabsJohn Hammond
Targeted APT Activity: BABYSHARK Is Out for Blood
BabyShark
2022-03-01ElasticAndrew Pease, Cyril François, Daniel Stepanic, Github (@1337-42), Github (@ayfaouzi), Github (@jtnk), Mark Mager, Samir Bousseaden
Elastic protects against data wiper malware targeting Ukraine: HERMETICWIPER
HermeticWiper
2022-03-01QualysMayuresh Dani
Ukrainian Targets Hit by HermeticWiper, New Datawiper Malware
HermeticWiper
2022-03-01Twitter (@TheDFIRReport)The DFIR Report
Twitter thread with highlights from conti leaks
Conti
2022-03-01KasperskyGReAT
Elections GoRansom – a smoke screen for the HermeticWiper attack
PartyTicket
2022-03-01AkamaiSecurity Intelligence Response Team
TCP Middlebox Reflection: Coming to a DDoS Near You
2022-03-01Marco Ramilli's BlogMarco Ramilli
DiskKill/HermeticWiper and NotPetya (Dis)similarities
EternalPetya HermeticWiper
2022-03-01GoogleGoogle Threat Analysis Group, Shane Huntley
TAG Bulletin: Q1 2022
2022-03-01Medium whickey000Wade Hickey
How I Cracked CONTI Ransomware Group’s Leaked Source Code ZIP File
Conti
2022-03-01ESET ResearchESET Research
IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine
HermeticWiper IsaacWiper PartyTicket
2022-03-01Twitter (@ContiLeaks)ContiLeaks
Tweet on Emotet final server scheme
Emotet
2022-03-01CleafyCleafy
TeaBot is now spreading across the globe
Anatsa
2022-02-28Bleeping ComputerSergiu Gatlan
Meta: Ukrainian officials, military targeted by Ghostwriter hackers
Ghostwriter
2022-02-28MicrosoftMSRC Team
Cyber threat activity in Ukraine: analysis and resources
CaddyWiper DesertBlade DoubleZero HermeticWiper INDUSTROYER2 IsaacWiper PartyTicket WhisperGate DEV-0586
2022-02-28NCSC UKNCSC UK
Malware Analysis Report: SparrowDoor
SparrowDoor GhostEmperor
2022-02-28TrellixTaylor Mullins
Trellix Global Defenders: Analysis and Protections for RagnarLocker Ransomware
RagnarLocker RagnarLocker