Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-08-05Group-IBNikita Rostovcev, Viktor Okorokov
Prometheus TDS The key to success for Campo Loader, Hancitor, IcedID, and QBot
Prometheus Backdoor Buer campoloader Hancitor IcedID QakBot
2021-08-02KELAVictoria Kivilevich
All Access Pass: Five Trends with Initial Access Brokers
2021-07-14Medium s2wlabJaeki Kim
Matryoshka : Variant of ROKRAT, APT37 (Scarcruft)
RokRAT
2021-05-06Group-IBViktor Okorokov
GrelosGTM group abuses Google Tag Manager to attack e-commerce websites
2021-04-14Group-IBVictor Okorokov
Lazarus BTC Changer Back in action with JS sniffers redesigned to steal crypto
2021-03-15Group-IBVictor Okorokov
JavaScript sniffers' new tricks: Analysis of the E1RB JS sniffer family
2021-03-10NTT SecurityHiroki Hada
日本を標的としたPseudoGateキャンペーンによるSpelevo Exploit Kitを用いた攻撃について
Zloader
2021-02-18NTT SecurityHiroki Hada
nccTrojan used in targeted attack by TA428 group against defense and aviation organizations
nccTrojan
2021-02-15cyblecybleinc
Ngrok Platform Abused by Hackers to Deliver a New Wave of Phishing Attacks
2021-01-06MalwarebytesHossein Jazi
Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat
RokRAT
2020-12-23Group-IBViktor Okorokov
New attacks by UltraRank group
2020-12-22PrevasioSergei Shevchenko
Sunburst Backdoor, Part III: DGA & Security Software (Broken Link)
SUNBURST
2020-12-15PrevasioSergei Shevchenko
Sunburst Backdoor: A Deeper Look Into The SolarWinds' Supply Chain Malware (Broken link)
SUNBURST
2020-12-11NTT SecurityHiroki Hada
Panda’s New Arsenal: Part 3 Smanager
FunnyDream SManager Tmanger
2020-12-07Group-IBVictor Okorokov
Massive malicious campaign by FakeSecurity JS-sniffer
2020-11-18NTT SecurityHiroki Hada
Panda’s New Arsenal: Part 2 Albaniiutas
Albaniiutas
2020-10-15NTT SecurityHiroki Hada
Panda’s New Arsenal: Part 1 Tmanger
Tmanger
2020-09-18KELARaveed Laeb, Victoria Kivilevich
The Initial Access Broker’s Toolbox – Remote Monitoring and Management
2020-09-14Trend MicroAbraham Camba, Aprilyn Borja, Gilbert Sison, Jay Yaneza, Khristoffer Jocson, Ryan Maglaque
Analysis of a Convoluted Attack Chain Involving Ngrok
2020-08-06KELARaveed Laeb, Victoria Kivilevich
The Secret Life of an Initial Access Broker