Click here to download all references as Bib-File.•
2022-07-27
⋅
Elastic
⋅
Exploring the QBOT Attack Pattern QakBot |
2022-07-27
⋅
Elastic
⋅
QBOT Configuration Extractor QakBot |
2022-06-01
⋅
Elastic
⋅
CUBA Ransomware Campaign Analysis Cobalt Strike Cuba Meterpreter MimiKatz SystemBC |
2022-06-01
⋅
Elastic
⋅
CUBA Ransomware Malware Analysis Cuba |
2022-05-17
⋅
Elastic
⋅
A peek behind the BPFDoor BPFDoor |
2022-05-05
⋅
Elastic
⋅
BLISTER Loader Blister |
2022-03-07
⋅
Elastic
⋅
PHOREAL Malware Targets the Southeast Asian Financial Sector PHOREAL |
2022-03-01
⋅
Elastic
⋅
Elastic protects against data wiper malware targeting Ukraine: HERMETICWIPER HermeticWiper |
2022-02-07
⋅
Elastic
⋅
Exploring Windows UAC Bypasses: Techniques and Detection Strategies |
2022-02-02
⋅
Elastic
⋅
Sandboxing Antimalware Products for Fun and Profit |
2022-01-19
⋅
Elastic
⋅
Operation Bleeding Bear WhisperGate |
2022-01-19
⋅
Elastic
⋅
Extracting Cobalt Strike Beacon Configurations Cobalt Strike |
2022-01-19
⋅
Elastic
⋅
Collecting Cobalt Strike Beacons with the Elastic Stack Cobalt Strike |
2022-01-19
⋅
Elastic
⋅
Operation Bleeding Bear WhisperGate |
2022-01-18
⋅
Elastic
⋅
FORMBOOK Adopts CAB-less Approach Formbook |
2021-12-23
⋅
Elastic
⋅
Elastic Security uncovers BLISTER malware campaign Blister |
2021-10-12
⋅
Elastic
⋅
Going Coast to Coast - Climbing the Pyramid with the Deimos Implant Deimos |
2021-07-27
⋅
Elastic
⋅
Collecting and operationalizing threat data from the Mozi botnet Mozi |
2021-07-07
⋅
Elastic
⋅
Elastic Security prevents 100% of REvil ransomware samples REvil |
2021-06-15
⋅
Elastic
⋅
What you need to know about Process Ghosting, a new executable image tampering attack |