Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-08-18ID RansomwareAndrew Ivanov
ThunderX Ransomware
ThunderX
2020-08-18F-SecureF-Secure Threat Intelligence Team
Lazarus Group Campaign Targeting the Cryptocurrency Vertical
2020-08-18F-Secure LabsF-Secure Labs
Lazarus Group: Campaign Targeting the Cryptocurrency Vertical
2020-08-18AreteArete Incident Response
Is Conti the New Ryuk?
Conti Ryuk
2020-08-18Menlo SecurityKrishnan Subramanian
New Attack Alert: Duri
2020-08-18Medium mariohenkelMario Henkel
Decrypt MassLogger 2.4.0.0 configuration
MASS Logger
2020-08-17Cado SecurityChris Doman
Team TNT – The First Crypto-Mining Worm to Steal AWS Credentials
TeamTNT TeamTNT
2020-08-17Twitter (@Arkbird_SOLG)Arkbird
Short twitter thread with analysis on Loup ATM malware
Loup
2020-08-17AquaYaniv Agman
Uncover Malware Payload Executions Automatically with Tracee
2020-08-17PWCPWC UK
WellMess malware: analysis of its Command and Control (C2) server
elf.wellmess
2020-08-17Cado SecurityChris Doman, James Campbell
Team TNT - The First Crypto-Mining Worm to Steal AWS Credentials
TeamTNT
2020-08-17Twitter (@r3c0nst)Frank Boldewin
Tweet on Loup
Loup
2020-08-16Hatena Blog谷川哲司
WastedLocker IoC collection
WastedLocker
2020-08-16kienmanowar Blogm4n0w4r
Manual Unpacking IcedID Write-up
IcedID
2020-08-15Twitter (@Int2e_)Adrien B
Tweet on DoubleFantasy
DoubleFantasy
2020-08-14NSANSA
Drovorub Malware: Fact Sheet & FAQs
2020-08-14Twitter (@VK_intel)Vitali Kremez
Tweet on Zloader infection leading to Cobaltstrike Installation
Cobalt Strike Zloader
2020-08-14ZscalerMohd Sadique
PurpleWave - A New Infostealer from Russia
PurpleWave
2020-08-14Binary DefenseJames Quinn
EmoCrash: Exploiting a Vulnerability in Emotet Malware for Defense
Emotet
2020-08-14Twitter (@3xp0rtblog)3xp0rt
Tweet on Osiris
Kronos