Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-05-21Twitter (@alberto__segura)Alberto Segura
Tweet on Flubot version 4.2 (p.php variant) with new AES strings encryption
FluBot
2021-05-21blackarrowPablo Ambite
Leveraging Microsoft Teams to persist and cover up Cobalt Strike traffic
Cobalt Strike
2021-05-21НКЦКИ - Главная, Ростелеком-Солар
Research report of the series of attacks on the state authorities of the Russian Federation
Mail-O
2021-05-21The RecordCatalin Cimpanu
FSB NKTsKI: Foreign ‘cyber mercenaries’ breached Russian federal agencies
Mail-O
2021-05-21Bleeping ComputerIonut Ilascu
DarkSide affiliates claim gang's bitcoins in deposit on hacker forum
DarkSide
2021-05-21360 Total Securitykate
DarkSide’s Targeted Ransomware Analysis Report for Critical U.S. Infrastructure
DarkSide
2021-05-20SubexSecureHussain Kathawala
CyberGate Threat Report
CyberGate
2021-05-20CrowdStrikejoshua fraser
Response When Minutes Matter: When Good Tools Are Used for (R)Evil
REvil
2021-05-20FBIFBI
Alert Number CP-000147-MW: Conti Ransomware Attacks Impact Healthcare and First Responder Networks
Conti
2021-05-20Digital ShadowsStefano De Blasi
Ransomware-as-a-Service, Rogue Affiliates, and What’s Next
DarkSide DarkSide REvil
2021-05-20WiredAndy Greenberg
The Full Story of the Stunning RSA Hack Can Finally Be Told
2021-05-20SentinelOneMarco Figueroa
Caught in the Cloud | How a Monero Cryptominer Exploits Docker Containers
2021-05-20MicrosoftMicrosoft 365 Defender Threat Intelligence Team
Phorpiex morphs: How a longstanding botnet persists and thrives in the current threat environment
Phorpiex
2021-05-20laceworkChris Hall, Jared Stroud, Tom Hegel
8220 Gangs Recent use of Custom Miner and Botnet
2021-05-20RiskIQJennifer Grob
Analysis of Infrastructure used by DarkSide Affiliates
DarkSide
2021-05-20Github (microsoft)Microsoft
Microsoft 365 Defender Hunting Queries for hunting multiple threat actors' TTPs and malwares
STRRAT OceanLotus BabyShark Elise Revenge RAT WastedLocker Zebrocy
2021-05-20Twitter (@MsftSecIntel)Microsoft Security Intelligence
Tweet on Java-based STRRAT malware campaign distributed via email
STRRAT
2021-05-19Avast DecodedDavid Zimmer
Binary Reuse of VB6 P-Code Functions
2021-05-19Team CymruAndy Kraus, Josh Hopkins, Nick Byers
Tracking BokBot Infrastructure Mapping a Vast and Currently Active BokBot Network
IcedID
2021-05-19Medium Mehmet ErgeneMehmet Ergene
Enterprise Scale Threat Hunting: Network Beacon Detection with Unsupervised ML and KQL — Part 2
Cobalt Strike