Click here to download all references as Bib-File.•
| 2024-08-20
⋅
Intel 471
⋅
Threat Hunting Case Study: Tracking Down GootLoader GootLoader |
| 2024-08-08
⋅
Huntress Labs
⋅
X Octowave Loader |
| 2024-08-07
⋅
Symantec
⋅
Cloud Cover: How Malicious Actors Are Leveraging Cloud Services GoGra Grager MOONTAG Ondritols TONERJAM |
| 2024-08-02
⋅
Quorum Cyber
⋅
SharpRhino – New Hunters International RAT Identified by Quorum Cyber SharpRhino |
| 2024-07-23
⋅
Symantec
⋅
Daggerfly: Espionage Group Makes Major Update to Toolset Nightdoor |
| 2024-07-23
⋅
Hunt.io
⋅
A Simple Approach to Discovering Oyster Backdoor Infrastructure Broomstick |
| 2024-07-22
⋅
Censys
⋅
A Beginner’s Guide to Hunting Malicious Open Directories Cobalt Strike Lumma Stealer Vidar |
| 2024-07-17
⋅
Huntress Labs
⋅
Fake Browser Updates Lead to BOINC Volunteer Computing Software FAKEUPDATES MintsLoader AsyncRAT |
| 2024-06-25
⋅
Hunt.io
⋅
Good Game, Gone Bad: Xeno RAT Spread Via .gg Domains and GitHub XenoRAT |
| 2024-06-24
⋅
GootLoader Wordpress
⋅
Gootloader’s New Hideout Revealed: The Malware Hunt in WordPress’ Shadows GootLoader |
| 2024-06-20
⋅
Hunt.io
⋅
Caught in the Act: Uncovering SpyNote in Unexpected Places SpyNote |
| 2024-06-12
⋅
Symantec
⋅
Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day Black Basta UNC4393 |
| 2024-06-12
⋅
Symantec
⋅
Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day Black Basta |
| 2024-06-06
⋅
Hunt.io
⋅
Tracking LightSpy: Certificates as Windows into Adversary Behavior lightSpy |
| 2024-05-30
⋅
Hunt.io
⋅
SolarMarker: Hunt Insights and Findings solarmarker |
| 2024-05-24
⋅
SOCRadar
⋅
Dark Web Profile: Hunt3r Kill3rs Hunt3r Kill3rs |
| 2024-05-16
⋅
Symantec
⋅
Springtail: New Linux Backdoor Added to Toolkit Gomir Kimsuky |
| 2024-04-09
⋅
Hunt.io
⋅
BlueShell: Four Years On, Still A Formidable Threat BlueShell |
| 2024-04-02
⋅
Darktrace
⋅
The Early Bird Catches the Worm: Darktrace’s Hunt for Raspberry Robin Raspberry Robin |
| 2024-03-04
⋅
⋅
Weixin
⋅
Shadow Hunting: Analysis of APT37’s attack activities against South Korea using North Korean political topics RokRAT |