Click here to download all references as Bib-File.•
2020-08-18
⋅
ID Ransomware
⋅
ThunderX Ransomware ThunderX |
2020-08-18
⋅
F-Secure
⋅
Lazarus Group Campaign Targeting the Cryptocurrency Vertical |
2020-08-18
⋅
F-Secure Labs
⋅
Lazarus Group: Campaign Targeting the Cryptocurrency Vertical |
2020-08-18
⋅
Arete
⋅
Is Conti the New Ryuk? Conti Ryuk |
2020-08-18
⋅
Menlo Security
⋅
New Attack Alert: Duri |
2020-08-18
⋅
Medium mariohenkel
⋅
Decrypt MassLogger 2.4.0.0 configuration MASS Logger |
2020-08-17
⋅
Cado Security
⋅
Team TNT – The First Crypto-Mining Worm to Steal AWS Credentials TeamTNT TeamTNT |
2020-08-17
⋅
Twitter (@Arkbird_SOLG)
⋅
Short twitter thread with analysis on Loup ATM malware Loup |
2020-08-17
⋅
Aqua
⋅
Uncover Malware Payload Executions Automatically with Tracee |
2020-08-17
⋅
PWC
⋅
WellMess malware: analysis of its Command and Control (C2) server elf.wellmess |
2020-08-17
⋅
Cado Security
⋅
Team TNT - The First Crypto-Mining Worm to Steal AWS Credentials TeamTNT |
2020-08-17
⋅
Twitter (@r3c0nst)
⋅
Tweet on Loup Loup |
2020-08-16
⋅
⋅
Hatena Blog
⋅
WastedLocker IoC collection WastedLocker |
2020-08-16
⋅
kienmanowar Blog
⋅
Manual Unpacking IcedID Write-up IcedID |
2020-08-15
⋅
Twitter (@Int2e_)
⋅
Tweet on DoubleFantasy DoubleFantasy |
2020-08-14
⋅
NSA
⋅
Drovorub Malware: Fact Sheet & FAQs |
2020-08-14
⋅
Twitter (@VK_intel)
⋅
Tweet on Zloader infection leading to Cobaltstrike Installation Cobalt Strike Zloader |
2020-08-14
⋅
Zscaler
⋅
PurpleWave - A New Infostealer from Russia PurpleWave |
2020-08-14
⋅
Binary Defense
⋅
EmoCrash: Exploiting a Vulnerability in Emotet Malware for Defense Emotet |
2020-08-14
⋅
Twitter (@3xp0rtblog)
⋅
Tweet on Osiris Kronos |