Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-07-09US Department of JusticeOffice of Public Affairs
Justice Department Leads Efforts Among Federal, International, and Private Sector Partners to Disrupt Covert Russian Government-Operated Social Media Bot Farm
2024-07-09Twitter (@H4ckManac)HackManac
Tweet on data breaches caused by 888 group
Threat Actor 888
2024-07-09SpamhausSpamhaus Malware Labs
Spamhaus Botnet Threat Update January to June 2024
Coper FluBot Hook Bashlite Mirai FAKEUPDATES AsyncRAT BianLian Cobalt Strike DCRat Havoc NjRAT QakBot Quasar RAT RedLine Stealer Remcos Rhadamanthys RisePro Sliver
2024-07-08Kaspersky LabsGReAT
CloudSorcerer – A new APT targeting Russian government entities
CloudSorcerer
2024-07-06unknown
xeno-RAT open-source remote access tool (RAT)
XenoRAT
2024-07-05Weixin360 Threat Intelligence Center
APT-C-26 (Lazarus) uses PyPI to attack Windows, Linux, and macOS platforms
SimpleTea SimpleTea
2024-07-05CloudwaysAbdul Rehman
Hacker Allegedly Leaks Data from Shopify Breach on BreachForums
Threat Actor 888
2024-07-05KrollRyan Hicks
CLEARFAKE Update Tricks Victim into Executing Malicious PowerShell Code
ClearFake
2024-07-02K7 SecurityArunkumar
Kematian Stealer forked from PowerShell Token Grabber
Kematian Stealer
2024-07-02SekoiaQuentin Bourgue
Exposing FakeBat loader: distribution methods and adversary infrastructure
BlackCat Royal Ransom EugenLoader Carbanak Cobalt Strike DICELOADER Gozi IcedID Lumma Stealer NetSupportManager RAT Pikabot RedLine Stealer SectopRAT Sliver SmokeLoader Vidar
2024-07-02Malsada TechAaron Samala, April Bucaneg, Casey Kuwada
The LandUpdate808 Fake Update Variant
FAKEUPDATES
2024-07-01Speakerdeck (takahiro_haruyama)Takahiro Haruyama
The Art of Malware C2 Scanning - How to Reverse and Emulate Protocol Obfuscated by Compiler
DOPLUGS Hodur
2024-06-30ZW01fMohamed Ezat
Deep Analysis of Snake (404 keylogger)
404 Keylogger
2024-06-28HarfangLabHarfangLab CTR
Supposed Grasshopper: operators impersonate Israeli government and private companies to deploy open-source malware
donut_injector Sliver
2024-06-28Trend MicroAhmed Mohamed Ibrahim, Shubham Singh, Sunil Bharti
Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer
Water Sigbin
2024-06-28cocomelonccocomelonc
Malware development trick 42: Stealing data via legit Discord Bot API. Simple C example.
2024-06-27Palo Alto Networks Unit 42Unit 42
Threat Actor Groups Tracked by Palo Alto Networks Unit 42
GOLD REBELLION
2024-06-27The Cyber ExpressEditorial
AzzaSec, NoName Cyberattackers Join Hands to Potentially Target Pro-Ukriane Allies
AzzaSec
2024-06-26US Department of JusticeOffice of Public Affairs
Russian National Charged for Conspiring with Russian Military Intelligence to Destroy Ukrainian Government Computer Systems and Data
WhisperGate
2024-06-26Group-IBGroup-IB
Craxs Rat, the master tool behind fake app scams and banking fraud
CraxsRAT SpyMax SpyNote