Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-06-01Stratosphere LabKamila Babayeva, Sebastian García
Dissecting a RAT. Analysis of the Command-line AndroRAT.
AndroRAT
2021-06-01BitdefenderAlin Mihai Barbatei, Oana Asoltanei, Silviu Stahie
Threat Actors Use Mockups of Popular Apps to Spread Teabot and Flubot Malware on Android
Anatsa FluBot
2021-06-01wordfenceRam Gall
Critical 0-day in Fancy Product Designer Under Active Attack
2021-05-31WiredAndy Greenberg
Hacker Lexicon: What Is a Supply Chain Attack?
EternalPetya SUNBURST
2021-05-31DataBreaches.netDissent
Babuk re-organizes as Payload Bin, offers its first leak
Babuk HelloKitty
2021-05-29Twitter (@elisalem9)Eli Salem
Tweet on obfuscation mechanism and extraction procedure of COBALTSTRIKE beacon module used by NOBELIUM/UNC2452
Cobalt Strike
2021-05-29Youtube (AhmedS Kasmani)AhmedS Kasmani
Analysis of ICEID Malware Installer DLL
IcedID
2021-05-28MicrosoftMicrosoft Threat Intelligence Center (MSTIC)
Breaking down NOBELIUM’s latest early-stage toolset
BOOMBOX Cobalt Strike
2021-05-28CISAUS-CERT
Malware Analysis Report (AR21-148A): Cobalt Strike Beacon
Cobalt Strike
2021-05-28SUCURIBen Martin
WooCommerce Credit Card Skimmer Hides in Plain Sight
2021-05-28Twitter (@MBThreatIntel)Malwarebytes Threat Intelligence
Tweet on web skimmer hiding JavaScript inside images for exfiltration
2021-05-28Trend MicroMina Nalim
DarkSide on Linux: Virtual Machines Targeted
DarkSide
2021-05-27cyberpunkleighcyberpunkleigh
Apostle Ransomware Analysis
Apostle
2021-05-27JPCERT/CCYuma Masubuchi
Attacks Embedding XMRig on Compromised Servers
2021-05-27Check PointCheck Point Research
Uyghurs, a Turkic ethnic minority in China, targeted via fake foundations - Check Point Research
2021-05-27VolexityDamien Cash, Josh Grunzweig, Matthew Meltzer, Sean Koessel, Steven Adair, Thomas Lancaster
Suspected APT29 Operation Launches Election Fraud Themed Phishing Campaigns
Cobalt Strike
2021-05-27FireEyeDan Perez, Emiel Haeghebaert, Greg Wood, Sarah Jones, Stephen Eckels
Re-Checking Your Pulse: Updates on Chinese APT Actors Compromising Pulse Secure VPN Devices
UNC2630 UNC2717
2021-05-27MicrosoftTom Burt
Another Nobelium Cyberattack
2021-05-27360 netlabAlex.Turing, Chai Linyuan, Jinye
Analysis report of the Facefish rootkit
Facefish
2021-05-26DeepInstinctRon Ben Yizhak
A Deep Dive into Packing Software CryptOne
Cobalt Strike Dridex Emotet Gozi ISFB Mailto QakBot SmokeLoader WastedLocker Zloader