Click here to download all references as Bib-File.•
2022-01-03
⋅
AhnLab
⋅
Distribution of Redline Stealer Disguised as Software Crack DanaBot RedLine Stealer Vidar |
2022-01-03
⋅
MinervaLabs
⋅
Malicious Telegram Installer Drops Purple Fox Rootkit PurpleFox |
2022-01-02
⋅
Atomic Matryoshka
⋅
"Cracking Open the Malware Piñata" Series: Intro to Dynamic Analysis with RedLineStealer RedLine Stealer |
2022-01-02
⋅
BleepingComputer
⋅
Malicious CSV text files used to install BazarBackdoor malware BazarBackdoor |
2022-01-02
⋅
forensicitguy
⋅
Analyzing a Magnitude EK Appx Package Dropping Magniber Magniber |
2022-01-02
⋅
Medium amgedwageh
⋅
Automating The Analysis Of An AutoIT Script That Wraps A Remcos RAT Remcos |
2022-01-02
⋅
SBIDIOT IoT Malware: miner edition SBIDIOT |
2022-01-02
⋅
ReversingFun
⋅
MMON (aka KAPTOXA) MMON |
2022-01-01
⋅
Symposium on Electronic Crime Research
⋅
Money Over Morals: A Business Analysis of Conti Ransomware Conti Conti |
2022-01-01
⋅
aspirets
⋅
Bumblebee Malware Loader: Threat Analysis BumbleBee |
2022-01-01
⋅
Malpedia
⋅
Malpedia Entry for PyAesLoader PyAesLoader |
2022-01-01
⋅
Brute Ratel brute_ratel |
2022-01-01
⋅
Triskele Labs
⋅
Investigating a Monero Coin Miner Coinminer |
2022-01-01
⋅
Blueliv
⋅
Jester Stealer Malware Research 2022 |
2022-01-01
⋅
Silent Push
⋅
Privacy tools (not) for you SmokeLoader |
2022-01-01
⋅
Silent Push
⋅
Lapsus$ Group (DEV-0537/UNC3661) - an emerging dark net threat actor leveraging insider threats-or was it? |
2022-01-01
⋅
Silent Push
⋅
Consequences- The Conti Leaks and future problems Cobalt Strike Conti |
2022-01-01
⋅
Silent Push
⋅
Phishing sites on bulletproof hosting infrastructure |
2022-01-01
⋅
Silent Push
⋅
Phishing infrastructure used to target US government contractors |
2022-01-01
⋅
Silent Push
⋅
Credit card phishing using NHS Covid Pass as a lure |