Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-05-31Trend MicroIeriz Nicolle Gonzalez, Ivan Nicole Chavez, Jeffrey Francis Bonaobra, Katherine Casona, Trend Micro
Investigating BlackSuit Ransomware’s Similarities to Royal
BlackSuit BlackSuit
2023-05-30Trend MicroFeike Hacquebord, Fernando Mercês, Lord Alfred Remorin, Stephen Hilt
Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals
ROMCOM RAT RomCom
2023-05-26Trend MicroPaul John Bardon, Sarah Pearl Camiling
New Info Stealer Bandit Stealer Targets Browsers, Wallets
Bandit Stealer
2023-05-22Trend MicroBahaa Yamany, Mahmoud Zohdy, Mohamed Fahmy, Sherif Magdy
BlackCat Ransomware Deploys New Signed Kernel Driver
BlackCat
2023-05-19Trend MicroJaromír Hořejší, Nitesh Surana
Rust-Based Info Stealers Abuse GitHub Codespaces
DeltaStealer
2023-05-16Trend MicroSunil Bharti
8220 Gang Evolves With New Strategies
Water Sigbin
2023-05-09TrendmicroGilbert Sison, Khristian Joseph Morales
Managed XDR Investigation of Ducktail in Trend Micro Vision One
DUCKTAIL
2023-05-02Trend MicroHara Hiroaki, Ted Lee
Attack on Security Titans: Earth Longzhi Returns With New Tricks
Croxloader SPHijacker Earth Longzhi
2023-04-28Trend MicroDon Ovid Ladores, Earle Maui Earnshaw, Ian Kenefick
Rapture, a Ransomware Family With Similarities to Paradise
Paradise
2023-04-24Trend MicroDon Ovid Ladores
ViperSoftX Updates Encryption, Steals Data
ViperSoftX
2023-04-18Trend MicroDon Ovid Ladores
An Analysis of the BabLock (aka Rorschach) Ransomware
Rorschach Ransomware
2023-04-18Trend MicroDon Ovid Ladores
An Analysis of the BabLock (aka Rorschach) Ransomware (IoCs)
Rorschach Ransomware
2023-03-30Trend MicroTrend Micro Research
Developing Story: Information on Attacks Involving 3CX Desktop App
3CX Backdoor IconicStealer
2023-03-29Trend MicroJaromír Hořejší, Joseph C Chen
New OpcJacker Malware Distributed via Fake VPN Malvertising
NetSupportManager RAT OpcJacker
2023-03-16Trend MicroCedric Pernet, Jaromír Hořejší, Loseway Lu
IPFS: A New Data Frontier or a New Cybercriminal Hideout?
Agent Tesla Formbook RedLine Stealer Remcos
2023-03-01Trend MicroDaniel Lunghi
Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting
HyperSSL HyperSSL
2023-02-24Trend MicroBuddy Tancio, Catherine Loveria, Jed Valderama
Investigating the PlugX Trojan Disguised as a Legitimate Windows Debugger Tool
PlugX
2023-02-17Trend MicroJaromír Hořejší, Joseph C Chen
Earth Kitsune Delivers New WhiskerSpy Backdoor via Watering Hole Attack
WhiskerSpy Earth Kitsune
2023-02-16Trend MicroHara Hiroaki, Masaoki Shoji, Yuka Higashi
Invitation to a Secret Event: Uncovering Earth Yako’s Campaigns
MirrorKey TransBox Earth Yako
2023-02-09Trend MicroAliakbar Zahravi, Peter Girnus
Enigma Stealer Targets Cryptocurrency Industry with Fake Jobs
Enigma Loader