Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-02-28Bleeping ComputerSergiu Gatlan
Meta: Ukrainian officials, military targeted by Ghostwriter hackers
Ghostwriter
2022-02-28MicrosoftMSRC Team
Cyber threat activity in Ukraine: analysis and resources
CaddyWiper DesertBlade DoubleZero HermeticWiper INDUSTROYER2 IsaacWiper PartyTicket WhisperGate DEV-0586
2022-02-28NCSC UKNCSC UK
Malware Analysis Report: SparrowDoor
SparrowDoor GhostEmperor
2022-02-28TrellixTaylor Mullins
Trellix Global Defenders: Analysis and Protections for RagnarLocker Ransomware
RagnarLocker RagnarLocker
2022-02-28Twitter (@struppigel)Karsten Hahn
Tweet on Gofing discovery
Gofing
2022-02-28ReutersChristopher Bing
New Chinese hacking tool found, spurring U.S. warning to allies
Daxin
2022-02-28Cyber GeeksVlad Pasca
How to Analyze Malicious Documents – Case Study of an Attack Targeting Ukrainian Organization
2022-02-28Twitter (@M_haggis)The Haag
Tweet on parsing Daxin driver metadata using powershell
Daxin
2022-02-28ZDNetJonathan Greig
Microsoft finds FoxBlade malware on Ukrainian systems, removes RT from Windows app store
HermeticWiper
2022-02-28ASECASEC
Remcos RAT malware disseminated by pretending to be tax invoices
Remcos
2022-02-28TrellixTaylor Mullins
Trellix Global Defenders: Cyberattacks Targeting Ukraine and HermeticWiper Protections
HermeticWiper
2022-02-28TrellixTaylor Mullins
Trellix Global Defenders: Analysis and Protections for BlackByte Ransomware
BlackByte
2022-02-28Bleeping ComputerSergiu Gatlan
Meta: Ukrainian officials, military targeted by Ghostwriter hackers
Ghostwriter
2022-02-28MicrosoftMSRC Team
Cyber threat activity in Ukraine: analysis and resources
HermeticWiper IsaacWiper PartyTicket WhisperGate
2022-02-28SophosSean Gallagher
Conti and Karma actors attack healthcare provider at same time through ProxyShell exploits
Conti Karma
2022-02-28Lab52Jagaimo Kawaii
Looking for Penquins in the Wild
Penquin Turla
2022-02-28AhnLabASEC Analysis Team
CoinMiner Being Distributed to Vulnerable MS-SQL Servers
2022-02-28AhnLabASEC Analysis Team
Change in Distribution Method of Malware Disguised as Estimate (VBS Script)
Formbook
2022-02-28StairwellSteve Miller
Quick n’ dirty detection research: Building a labeled malware corpus for YARA testing
2022-02-28NSHCNSHC Threatrecon Team
Threat Actor targeted attack against Finance and Investment industry (ENG)