Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-06-26Cisco TalosAndrew Williams, Earl Carter, Edmund Brumaghin
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor
Thanatos Ransomware
2018-06-26Bleeping ComputerLawrence Abrams
Thanatos Ransomware Decryptor Released by the Cisco Talos Group
Thanatos Ransomware
2018-02-26Opcode Security researchntopcode
Anatomy of the Process Environment Block (PEB) (Windows Internals)
2018-02-26Bleeping ComputerLawrence Abrams
Thanatos Ransomware Is First to Use Bitcoin Cash. Messes Up Encryption
Thanatos Ransomware
2018-01-16Opcode Security researchntopcode
Anatomy of the thread suspension mechanism in Windows (Windows Internals)
2017-12-06BotconfRaimir Holanda, Renato Marinho
Exploring a P2P Transient Botnet - From Discovery to Enumeration
Rakos
2017-09-26ISCRenato Marinho
XPCTRA Malware Steals Banking and Digital Wallet User's Credentials
XPCTRA
2017-08-29InfoSec Handlers Diary BlogRenato Marinho
Second Google Chrome Extension Banker Malware in Two Weeks
IDKEY
2017-07-03The GuardianAlex Hern
'NotPetya' malware attacks could warrant retaliation, says Nato affiliated-researcher
EternalPetya
2017-06-16FireEyeFireEye
FIN10: Anatomy of a Cyber Extortion Operation
FIN10
2016-03-10ProofpointProofpoint Staff
Death Comes Calling: Thanatos/Alphabot Trojan Hits the Market
Thanatos
2015-02-05FireEyeDerek Gooley, Michael Lin
Anatomy of a Brute Force Campaign: The Story of Hee Thai Limited
XOR DDoS