Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-12-16RiskIQCory Kennedy, Jordan Herman, Mia Ihm
Skimming a Little Off the Top: Meyhod’s Skimming Methods Hit Hairloss Specialists
magecart
2020-12-16ReutersRaphael Satter
Exclusive-Suspected Chinese hackers stole camera footage from African Union - memo
2020-12-16LookoutApurva Kumar, Diane Wee, Justin Albrecht, Robert Nickle
Lookout Discovers New Spyware Used by Sextortionists to Blackmail iOS and Android Users
goontact
2020-12-16AccenturePaul Mansfield
Tracking and combatting an evolving danger: Ransomware extortion
DarkSide Egregor Maze Nefilim RagnarLocker REvil Ryuk SunCrypt
2020-12-16SophosLabs UncutSean Gallagher, Sivagnanam Gn
Ransomware operators use SystemBC RAT as off-the-shelf Tor backdoor
SystemBC
2020-12-15PrevasioSergei Shevchenko
Sunburst Backdoor: A Deeper Look Into The SolarWinds' Supply Chain Malware (Broken link)
SUNBURST
2020-12-15Google Project ZeroIan Beer, Samuel Groß
A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution
Chrysaor
2020-12-15KISAKrCERT
Operation MUZABI
Appleseed
2020-12-15MalwarebytesPieter Arntz
Threat profile: Egregor ransomware is making a name for itself
Egregor
2020-12-15VMRayVMRay Labs Team
Malware Analysis Spotlight – Hentai Oniichan Ransomware (Berserker Variant)
2020-12-15Cyborg SecurityAustin Jackson
Threat Hunt Deep Dives: SolarWinds Supply Chain Compromise (Solorigate / SUNBURST Backdoor)
SUNBURST
2020-12-15Medium (Cryptax)Axelle Apvrille
Unpacking an Android malware with Dexcalibur and JEB
2020-12-15Github (itsreallynick)Nick Carr
A quick note from Nick Carr on COSMICGALE and SUPERNOVA that those are unrelated to UC2452 intrusion campaign
SUPERNOVA
2020-12-15360 Threat Intelligence CenterAdvanced Threat Institute
Operation Falling Eagle-the secret of the most influential supply chain attack in history
SUNBURST
2020-12-15Twitter @cybercdh)Colin Hardy
Tweet on some more capabilties of SUNBURST backdoor
SUNBURST
2020-12-15FacebookDavid Agranovich, Nathaniel Gleicher
Removing Coordinated Inauthentic Behavior from France and Russia
2020-12-15Trend MicroBuddy Tancio, Gilbert Sison, Lenart Bermejo
Finding APTX: Attacks via MITRE TTPs
Chinoxy
2020-12-15CofenseAaron Riley
Strategic Analysis: Agent Tesla Expands Targeting and Networking Capabilities
Agent Tesla
2020-12-15HornetsecurityHornetsecurity Security Lab
QakBot reducing its on disk artifacts
Egregor PwndLocker QakBot
2020-12-15Trend MicroTrend Micro
Overview of Recent Sunburst Targeted Attacks
SUPERNOVA