Click here to download all references as Bib-File.•
2021-07-01
⋅
The Record
⋅
Mongolian certificate authority hacked eight times, compromised with malware Cobalt Strike |
2021-07-01
⋅
AT&T Cybersecurity
⋅
REvil’s new Linux version REvil REvil |
2021-07-01
⋅
Threatpost
⋅
Linux Variant of REvil Ransomware Targets VMware’s ESXi, NAS Devices REvil |
2021-07-01
⋅
BleepingComputer
⋅
Babuk ransomware is back, uses new version on corporate networks Babuk |
2021-07-01
⋅
Trend Micro
⋅
PurpleFox Using WPAD to Target Indonesian Users PurpleFox |
2021-06-30
⋅
Sophos SecOps
⋅
What to expect when you’ve been hit with REvil ransomware REvil |
2021-06-30
⋅
Cynet
⋅
Shelob Moonlight – Spinning a Larger Web From IcedID to CONTI, a Trojan and Ransomware collaboration Conti IcedID |
2021-06-30
⋅
synthesis.to blog
⋅
Automation in Reverse Engineering: String Decryption Mirai |
2021-06-30
⋅
BleepingComputer
⋅
Leaked Babuk Locker ransomware builder used in new attacks Babuk |
2021-06-30
⋅
The Record
⋅
Gozi malware gang member arrested in Colombia Gozi ISFB |
2021-06-30
⋅
RiskIQ
⋅
Bulletproof Hosting Services: Investigating Media Land LLC |
2021-06-30
⋅
Guardicore
⋅
SMB Worm “Indexsinas” Uses Lateral Movement to Infect Whole Networks |
2021-06-30
⋅
Group-IB
⋅
REvil Twins Deep Dive into Prolific RaaS Affiliates' TTPs Cobalt Strike REvil |
2021-06-30
⋅
Sophos
⋅
MTR in Real Time: Hand-to-hand combat with REvil ransomware chasing a $2.5 million pay day REvil |
2021-06-30
⋅
Advanced Intelligence
⋅
Ransomware-&-CVE: Industry Insights Into Exclusive High-Value Target Adversarial Datasets BlackKingdom Ransomware Clop dearcry Hades REvil |
2021-06-29
⋅
Yoroi
⋅
The "WayBack” Campaign: a Large Scale Operation Hiding in Plain Sight |
2021-06-29
⋅
Twitter (@IntezerLabs)
⋅
Tweet on unknown elf backdoor based on an open source remote shell named "amcsh" BioSet |
2021-06-29
⋅
Medium hidocohen
⋅
GuLoader’s Anti-Analysis Techniques CloudEyE |
2021-06-29
⋅
Facebook
⋅
Combating E-Commerce Scams and Account Takeover Attacks |
2021-06-29
⋅
Netskope
⋅
Not Laughing: Malicious Office Documents using LoLBins |