Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-02-10viXraJason Reaves
A Case Study into solving Crypters/Packers in Malware Obfuscation using an SMT approach
Locky
2020-02-10Kaspersky LabsAnna Malina
KBOT: sometimes they come back
Bolek
2020-02-10Bit of Hex BlogMatt
Suspected Sapphire Mushroom (APT-C-12) malicious LNK files
Unidentified PS 001 APT-C-12
2020-02-10MalwarebytesAdam Kujawa, Chris Boyd, David Ruiz, Jérôme Segura, Jovi Umawing, Nathan Collier, Pieter Arntz, Thomas Reed, Wendy Zamora
2020 State of Malware Report
magecart Emotet QakBot REvil Ryuk TrickBot WannaCryptor
2020-02-10ZDNetCatalin Cimpanu
FBI warns about ongoing attacks against software supply chain companies
DistTrack Kwampirs
2020-02-07Bleeping ComputerSergiu Gatlan
TA505 Hackers Behind Maastricht University Ransomware Attack
Clop
2020-02-07RiskIQJordan Herman
Magecart Group 12’s Latest: Actors Behind Attacks on Olympics Ticket Re-sellers Deftly Swapped Domains to Continue Campaign
magecart
2020-02-06GdataKarsten Hahn
40,000 CryptBot Downloads per Day: Bitbucket Abused as Malware Slinger
CryptBot
2020-02-06Bleeping ComputerLawrence Abrams
Ransomware Exploits GIGABYTE Driver to Kill AV Processes
RobinHood
2020-02-06SophosAndrew Brandt, Mark Loman
Living off another land: Ransomware borrows vulnerable driver to remove security software
RobinHood
2020-02-05Bleeping ComputerLawrence Abrams
Mailto (NetWalker) Ransomware Targets Enterprise Networks
Mailto
2020-02-05FireEyeAndrew Moore, Blaine Stancill, Genevieve Stark, Rick Cole
STOMP 2 DIS: Brilliance in the (Visual) Basics
MINEBRIDGE
2020-02-05SentinelOneVitali Kremez
Pro-Russian CyberSpy Gamaredon Intensifies Ukrainian Security Targeting
Pteranodon
2020-02-05CybereasonAssaf Dahan, Lior Rochberger
The Hole in the Bucket: Attackers Abuse Bitbucket to Deliver an Arsenal of Malware
Amadey Azorult Predator The Thief STOP Vidar
2020-02-04ID RansomwareAndrew Ivanov
RagnarLocker Ransomware
RagnarLocker
2020-02-04Github (onek1lo)one_k1lo
Borr-Stealer: Repository with decompiled code
Borr
2020-02-04one_k1lo
Borr Malware
Borr
2020-02-040x00secDan Lisichkin
Analyzing Modern Malware Techniques - Part 3: A case of Powershell, Excel 4 Macros and VB6
2020-02-03SANS ISCJan Kopriva
Analysis of a triple-encrypted AZORult downloader
Azorult
2020-02-03ID RansomwareAndrew Ivanov
PassLock Ransomware
Passlock