Click here to download all references as Bib-File.•
2023-02-08
⋅
Huntress Labs
⋅
Investigating Intrusions From Intriguing Exploits Silence |
2023-01-05
⋅
Mandiant
⋅
Turla: A Galaxy of Opportunity KopiLuwak Andromeda QUIETCANARY |
2022-11-14
⋅
Twitter (@embee_research)
⋅
Twitter thread on Yara Signatures for Qakbot Encryption Routines IcedID QakBot |
2022-11-03
⋅
paloalto Netoworks: Unit42
⋅
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild Cobalt Strike |
2022-10-28
⋅
velociraptor
⋅
Windows.Carving.SystemBC - SystemBC RAT configuration Purser for Velociraptor SystemBC |
2022-09-22
⋅
Broadcom
⋅
Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics BlackCat BlackMatter DarkSide |
2022-09-14
⋅
Mandiant
⋅
It's Time to PuTTY! DPRK Job Opportunity Phishing via WhatsApp BLINDINGCAN miniBlindingCan sRDI |
2022-08-04
⋅
Cisco Talos
⋅
Attackers leveraging Dark Utilities "C2aaS" platform in malware campaigns |
2022-07-25
⋅
Trend Micro
⋅
LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities BlackMatter LockBit |
2022-07-21
⋅
Censys
⋅
Russian Ransomware C2 Network Discovered in Censys Data DeimosC2 PoshC2 |
2022-07-19
⋅
SUCURI
⋅
PrestaShop Skimmer Concealed in One Page Checkout Module |
2022-07-06
⋅
Trend Micro
⋅
Brand-New HavanaCrypt Ransomware Poses as Google Software Update App, Uses Microsoft Hosting Service IP Address as C&C Server HavanaCrypt |
2022-06-28
⋅
Accenture
⋅
Steal(Bit) or exfil, what does it (Ex)Matter? Comparative Analysis of Custom Exfiltration Tools ExMatter StealBit |
2022-05-30
⋅
Automatically Unpacking IcedID Stage 1 with Angr IcedID |
2022-05-18
⋅
Cado Security
⋅
Linux Attack Techniques: Dynamic Linker Hijacking with LD Preload |
2022-05-16
⋅
Jamf Blog
⋅
UpdateAgent Adapts Again UpdateAgent |
2022-05-05
⋅
NCC Group
⋅
North Korea’s Lazarus: their initial access trade-craft using social media and social engineering LCPDot |
2022-04-28
⋅
nccgroup
⋅
LAPSUS$: Recent techniques, tactics and procedures |
2022-04-27
⋅
ESET Research
⋅
A lookback under the TA410 umbrella: Its cyberespionage TTPs and activity FlowCloud Lookback Witchetty |
2022-04-12
⋅
Sophos
⋅
Attackers linger on government agency computers before deploying Lockbit ransomware LockBit |