Click here to download all references as Bib-File.•
2022-01-25
⋅
Nozomi Networks
⋅
How to Analyze Malware for Technical Writing DarkSide |
2022-01-24
⋅
Check Point Research
⋅
Scammers are creating new fraudulent Crypto Tokens and misconfiguring smart contract’s to steal funds |
2021-11-12
⋅
Twitter (@3xp0rtblog)
⋅
Tweets on DarkLoader DarkLoader |
2021-09-03
⋅
Twitter (@ESETresearch)
⋅
Twitter thread on SPARKLOG, a launcher component for PRIVATELOG along with STASHLOG PRIVATELOG STASHLOG |
2021-08-26
⋅
The New York Times
⋅
Spies for Hire: China’s New Breed of Hackers Blends Espionage and Entrepreneurship |
2021-08-22
⋅
Malware and Stuff
⋅
PEB: Where Magic Is Stored Dacls |
2021-08-06
⋅
Sophos Naked Security
⋅
Conti ransomware affiliate goes rogue, leaks “gang data” Conti |
2021-08-03
⋅
Twitter (@ValthekOn)
⋅
Tweet on blacklisted extensions & names of BlackMatter ransomware making the check against custom hashes values DarkSide |
2021-08-02
⋅
Youtube (Forschungsinstitut Cyber Defense)
⋅
The CODE 2021: Workshop presentation and demonstration about CobaltStrike Cobalt Strike |
2021-07-19
⋅
Proofpoint
⋅
New Threat Actor Uses Spanish Language Lures to Distribute Seldom Observed Bandook Malware Bandook Caliente Bandits |
2021-06-22
⋅
Darktrace
⋅
Crypto-mining on a DNS server |
2021-06-17
⋅
Intezer
⋅
Klingon RAT Holding on for Dear Life KlingonRAT |
2021-06-17
⋅
Proofpoint
⋅
New TA402 Molerats Malware Targets Governments in the Middle East Molerat Loader |
2021-05-27
⋅
cyberpunkleigh
⋅
Apostle Ransomware Analysis Apostle |
2021-05-19
⋅
Nozomi Networks
⋅
Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works DarkSide |
2021-04-16
⋅
Trend Micro
⋅
XCSSET Quickly Adapts to macOS 11 and M1-based Macs XCSSET |
2021-03-09
⋅
360 netlab
⋅
Threat Alert: z0Miner Is Spreading quickly by Exploiting ElasticSearch and Jenkins Vulnerabilities |
2021-02-22
⋅
AdvIntel
⋅
Economic Growth, Digital Inclusion, & Specialized Crime: Financial Cyber Fraud in LATAM BRATA Mekotio Metamorfo Ploutus ATM VictoryGate |
2021-02-08
⋅
Medium kurtikleiton
⋅
Evade EDR with Shellcode Injection and gain persistence using Registry Run Keys |
2021-01-26
⋅
FireEye
⋅
Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication |