Click here to download all references as Bib-File.•
2023-01-30
⋅
ESET Research
⋅
APT Activity Report T3 2022: Sandworm Deploying its Enhanced Wiper Arsenal |
2023-01-27
⋅
ESET Research
⋅
Tweets on SwiftSlicer SwiftSlicer |
2023-01-27
⋅
ESET Research
⋅
SwiftSlicer: New destructive wiper malware strikes Ukraine SwiftSlicer |
2023-01-10
⋅
ESET Research
⋅
StrongPity espionage campaign targeting Android users |
2022-12-14
⋅
ESET Research
⋅
Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities LODEINFO MirrorFace |
2022-12-07
⋅
ESET Research
⋅
Fantasy – a new Agrius wiper deployed through a supply‑chain attack Apostle DEADWOOD |
2022-11-30
⋅
ESET Research
⋅
Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin |
2022-11-25
⋅
Twitter (@ESETresearch)
⋅
Twitter thread about RansomBoggs campaign against Ukraine |
2022-11-23
⋅
ESET Research
⋅
Bahamut cybermercenary group targets Android users with fake VPN apps Bahamut |
2022-11-22
⋅
Twitter (@ESETresearch)
⋅
Tweets on SysUpdate / Soldier / HyperSSL HyperSSL |
2022-10-11
⋅
ESET Research
⋅
POLONIUM targets Israel with Creepy malware CreepySnail CreepExfil DeepCreep MegaCreep Unidentified 097 (Polonium Keylogger) |
2022-10-06
⋅
Twitter (@ESETresearch)
⋅
Tweet on Bumblebee being modularized like trickbot BumbleBee |
2022-09-30
⋅
ESET Research
⋅
Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium BLINDINGCAN FudModule HTTP(S) uploader LambLoad TOUCHMOVE |
2022-09-28
⋅
Twitter (@ESETresearch)
⋅
Twitter Thread linking CloudMensis to RokRAT / ScarCruft CloudMensis RokRAT |
2022-09-14
⋅
ESET Research
⋅
You never walk alone: The SideWalk backdoor gets a Linux variant SideWalk |
2022-09-06
⋅
ESET Research
⋅
Worok: The big picture MimiKatz PNGLoad reGeorg ShadowPad Worok |
2022-08-16
⋅
Twitter (@ESETresearch)
⋅
Twitter thread about Operation In(ter)ception for macOS Interception |
2022-07-19
⋅
ESET Research
⋅
I see what you did there: A look at the CloudMensis macOS spyware CloudMensis |
2022-06-16
⋅
ESET Research
⋅
How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security Emotet |
2022-05-04
⋅
Twitter (@ESETresearch)
⋅
Twitter thread on code similarity analysis, focussing on IsaacWiper and recent Cluster25 publication IsaacWiper |