Click here to download all references as Bib-File.•
2018-06-26
⋅
Cisco Talos
⋅
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor Thanatos Ransomware |
2018-06-26
⋅
Bleeping Computer
⋅
Thanatos Ransomware Decryptor Released by the Cisco Talos Group Thanatos Ransomware |
2018-02-26
⋅
Opcode Security research
⋅
Anatomy of the Process Environment Block (PEB) (Windows Internals) |
2018-02-26
⋅
Bleeping Computer
⋅
Thanatos Ransomware Is First to Use Bitcoin Cash. Messes Up Encryption Thanatos Ransomware |
2018-01-16
⋅
Opcode Security research
⋅
Anatomy of the thread suspension mechanism in Windows (Windows Internals) |
2017-12-06
⋅
Botconf
⋅
Exploring a P2P Transient Botnet - From Discovery to Enumeration Rakos |
2017-09-26
⋅
ISC
⋅
XPCTRA Malware Steals Banking and Digital Wallet User's Credentials XPCTRA |
2017-08-29
⋅
InfoSec Handlers Diary Blog
⋅
Second Google Chrome Extension Banker Malware in Two Weeks IDKEY |
2017-07-03
⋅
The Guardian
⋅
'NotPetya' malware attacks could warrant retaliation, says Nato affiliated-researcher EternalPetya |
2017-06-16
⋅
FireEye
⋅
FIN10: Anatomy of a Cyber Extortion Operation FIN10 |
2016-03-10
⋅
Proofpoint
⋅
Death Comes Calling: Thanatos/Alphabot Trojan Hits the Market Thanatos |
2015-02-05
⋅
FireEye
⋅
Anatomy of a Brute Force Campaign: The Story of Hee Thai Limited XOR DDoS |