Click here to download all references as Bib-File.•
2022-02-18
⋅
0x00sec
⋅
Dynamically extracting the encryption key from a simple ransomware |
2022-02-18
⋅
Bleeping Computer
⋅
New Golang botnet empties Windows users’ cryptocurrency wallets Anubis Loader SmokeLoader |
2022-02-18
⋅
Check Point
⋅
EvilPlayout: Attack Against Iran’s State Broadcaster EvilPlayout WinScreeny Edalat-e Ali |
2022-02-18
⋅
Huntress Labs
⋅
Hackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection Cobalt Strike |
2022-02-18
⋅
Intezer
⋅
TeamTNT Cryptomining Explosion TeamTNT |
2022-02-18
⋅
Recorded Future
⋅
Executive Overview of Russian Aggression Against Ukraine |
2022-02-18
⋅
Kookmin University
⋅
A Method for Decrypting Data Infected with Hive Ransomware Hive Hive |
2022-02-18
⋅
Reuters
⋅
How a Saudi woman's iPhone revealed hacking around the world Chrysaor |
2022-02-18
⋅
The Record
⋅
Academics publish method for recovering data encrypted by the Hive ransomware Hive Hive |
2022-02-18
⋅
Bleeping Computer
⋅
Conti ransomware gang takes over TrickBot malware operation Conti TrickBot |
2022-02-18
⋅
YouTube (John Hammond)
⋅
Uncovering NETWIRE Malware - Discovery & Deobfuscation NetWire RC |
2022-02-18
⋅
AhnLab
⋅
PseudoManuscrypt Being Distributed in the Same Method as Cryptbot CryptBot PseudoManuscrypt |
2022-02-18
⋅
SANS ISC
⋅
Remcos RAT Delivered Through Double Compressed Archive Remcos |
2022-02-17
⋅
enigmasoft
⋅
Nwgen Ransomware Storm-0829 |
2022-02-17
⋅
Github (albertzsigovits)
⋅
Ransomware Windows DarkBit DarkBit |
2022-02-17
⋅
Github (Finch4)
⋅
GoSteal Analysis |
2022-02-17
⋅
Cloudsek
⋅
Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2) Blister |
2022-02-17
⋅
SinaCyber
⋅
Testimony before the U.S.-China Economic and Security Review Commission Hearing on “China’s Cyber Capabilities: Warfare, Espionage, and Implications for the United States” PlugX APT26 APT41 |
2022-02-17
⋅
Zscaler
⋅
FreeCryptoScam - A New Cryptocurrency Scam That Leads to Installation of Backdoors and Stealers DCRat |
2022-02-17
⋅
Sekoia
⋅
The story of a ransomware builder: from Thanos to Spook and beyond (Part 1) Hakbit |