Click here to download all references as Bib-File.•
2021-11-20
⋅
Twitter (@eduardfir)
⋅
Tweet on Velociraptor artifact analysis for Emotet Emotet |
2021-11-20
⋅
Advanced Intelligence
⋅
Corporate Loader "Emotet": History of "X" Project Return for Ransomware Emotet |
2021-11-19
⋅
Sangfor
⋅
The New Threat: Mallox Ransomware TargetCompany |
2021-11-19
⋅
⋅
FOCUS
⋅
Im Rätsel um gruselige Spionage-Software führt die Spur über Wirecard in den Kreml Subzero |
2021-11-19
⋅
⋅
360 Threat Intelligence Center
⋅
It is suspected that the APT-C-55 organization used the commercial software Web Browser Password Viewer to carry out the attack |
2021-11-19
⋅
Twitter (@knight0x07)
⋅
Tweet on Exmatter, custom data exfiltration tool, used by Blackmatter ransomware group ExMatter |
2021-11-19
⋅
insomniacs(Medium)
⋅
It’s a BEE! It’s a… no, it’s ShadowPad. ShadowPad |
2021-11-19
⋅
⋅
CRONUP
⋅
La Botnet de EMOTET reinicia ataques en Chile y LATAM Emotet |
2021-11-19
⋅
IronNet
⋅
Is a coordinated cyberattack brewing in the escalating Russian-Ukrainian conflict? |
2021-11-19
⋅
Trend Micro
⋅
Squirrelwaffle Exploits ProxyShell and ProxyLogon to Hijack Email Chains Cobalt Strike QakBot Squirrelwaffle |
2021-11-19
⋅
LAC WATCH
⋅
Malware Emotet resumes its activities for the first time in 10 months, and Japan is also the target of the attack Emotet |
2021-11-18
⋅
Cisco
⋅
BlackMatter, LockBit, and THOR BlackMatter LockBit PlugX |
2021-11-18
⋅
SophosLabs Uncut
⋅
New ransomware actor uses password protected archives to bypass encryption protection |
2021-11-18
⋅
Qualys
⋅
Conti Ransomware Conti |
2021-11-18
⋅
Proofpoint
⋅
Triple Threat: North Korea-Aligned TA406 Steals, Scams and Spies YoreKey |
2021-11-18
⋅
Proofpoint
⋅
Triple Threat: North Korea-Aligned TA406 Scams, Spies, and Steals YoreKey TA406 |
2021-11-18
⋅
Blackberry
⋅
Threat Thursday: DanaBot’s Evolution from Bank Fraud to DDos Attacks DanaBot |
2021-11-18
⋅
Netskope
⋅
Netskope Threat Coverage: The Return of Emotet Emotet |
2021-11-18
⋅
Venafi
⋅
APT41 Perfects Code Signing Abuse to Escalate Supply Chain Attacks |
2021-11-18
⋅
scelarityIO
⋅
The Art of PerSwaysion Investigation of a Long-Lived Phishing Kit |