Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-05-07SophosLabs UncutRajesh Nataraj
New Lemon Duck variants exploiting Microsoft Exchange Server
CHINACHOPPER Cobalt Strike Lemon Duck
2021-05-07TEAMT5Jhih-Lin Kuo, Zih-Cing Liao
"We Are About to Land": How CloudDragon Turns a Nightmare Into Reality
FlowerPower Appleseed BabyShark GoldDragon NavRAT
2021-05-07TEAMT5Aragorn Tseng, Charles Li
Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network
Cobalt Strike PlugX Waterbear
2021-05-07MicrosoftMicrosoft
Human operated ransomware
2021-05-07Marco Ramilli
MuddyWater: Binder Project (Part 2)
2021-05-07MorphisecNadav Lorber
Revealing the ‘Snip3’ Crypter, a Highly Evasive RAT Loader
Agent Tesla AsyncRAT NetWire RC Revenge RAT
2021-05-07SolarWindsSolarwind
An Investigative Update of the Cyberattack
SUNBURST
2021-05-07Department of JusticeOffice of Public Affairs
Four Individuals Plead Guilty to RICO Conspiracy Involving “Bulletproof Hosting” for Cybercriminals
Citadel SpyEye Zeus
2021-05-07GCHQCISA, FBI, NCSC UK, NSA
Further TTPs associated with SVR cyber actors: Use of multiple publicly available exploits and Sliver framework to target organisations globally
2021-05-07Medium svch0stsvch0st
Stats from Hunting Cobalt Strike Beacons
Cobalt Strike
2021-05-07Bleeping ComputerLawrence Abrams
Data leak marketplaces aim to take over the extortion economy
Babuk Maze
2021-05-07Group-IBOleg Skulkin, Semyon Rogachev
Connecting the Bots Hancitor fuels Cuba Ransomware Operations
Cuba Hancitor
2021-05-06IntrusiontruthIntrusiontruth
An APT with no name
BRONZE SPRING
2021-05-06Twitter (@MrDanPerez)Dan Perez
Tweet on UNC302 / oro0lxy using ColdFusion
BRONZE SPRING
2021-05-06Trend MicroArianne Dela Cruz, Cris Tomboc, Jayson Chong, Nikki Madayag, Sean Torre
Proxylogon: A Coinminer, a Ransomware, and a Botnet Join the Party
BlackKingdom Ransomware CHINACHOPPER Lemon Duck Prometei
2021-05-06Black HatAnurag Khanna, Thirumalai Natarajan Muthiah
Threat Hunting in Active Directory Environment
2021-05-06TencentJunyu Zhou, Tianze Ding
Domain Borrowing: Catch My C2 Traffic if You Can
2021-05-06TencentJunyu Zhou, Tianze Ding
Domain Borrowing: Catch My C2 Traffic if You Can
2021-05-06Black HatChristian Doerr, Tsuyoshi Taniguchi
How Did the Adversaries Abusing Bitcoin Blockchain Evade Our Takeover
Cerber Pony
2021-05-06Group-IBViktor Okorokov
GrelosGTM group abuses Google Tag Manager to attack e-commerce websites