Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-12-11MicrosoftMicrosoft Threat Intelligence
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine
Amadey Kazuar Wipbot FlyingYeti
2024-12-10Patreon (OALABS)Sergei Frankoff
Live Stream VOD: The Many Faces of CryptBot (Paywall)
CryptBot
2024-12-10Hunt.ioHunt.io
“Million OK !!!!” and the Naver Facade: Tracking Recent Suspected Kimsuky Infrastructure
Kimsuky
2024-12-08DataBreaches.netDissent
Is KillSec3 Trying to Extort Victims Using Publicly Leaked Data?
2024-12-06OALabsSergei Frankoff
CryptBot Evolution Tracking the many iterations of this stealer
CryptBot
2024-12-05Trend MicroDaniel Lunghi, Joseph Chen
MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks
2024-12-04Rapid7Tyler McGraw
Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware
Zloader
2024-12-04LumenBlack Lotus Labs, Danny Adamitis, Ryan English
Snowblind: The Invisible Hand of Secret Blizzard
Crimson RAT TwoDash
2024-12-03Hunt.ioHunt.io
Rare Watermark Links Cobalt Strike 4.10 Team Servers to Ongoing Suspicious Activity
Cobalt Strike
2024-12-03BitSightBitsight TRACE
PROXY.AM Powered by Socks5Systemz Botnet
Socks5 Systemz
2024-12-02FortiGuard LabsPei Han Liao
SmokeLoader Attack Targets Companies in Taiwan
SmokeLoader
2024-11-30Technical Evolutiontechevo
REKOOBE APT-31 Linux Backdoor Analysis
Rekoobe
2024-11-28Hunt.ioHunt.io
Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies
XWorm
2024-11-26Security IntelligenceNir Somech
What’s up India? PixPirate is back and spreading via WhatsApp
PixPirate
2024-11-22WiredAndy Greenberg
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack
2024-11-22VolexitySean Koessel, Steven Adair, Tom Lancaster
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
APT28
2024-11-20Orange CyberdefenseMarine PICHON, Piotr Malachiński
The hidden network: How China unites state, corporate, and academic assets for cyber offensive campaigns
2024-11-20IntrinsecEquipe CTI
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks
Coper SpyNote FAKEUPDATES GootLoader EugenLoader IcedID Matanbuchus Nokoyawa Ransomware Pikabot
2024-11-19Palo Alto Networks Unit 42Asher Davila, Chris Navarrete
FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications
FrostyGoop
2024-11-19LumenBlack Lotus Labs
One Sock Fits All: The Use And Abuse Of The NSOCKS Botnet
Ngioweb Ngioweb