Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-09-22Sentinel LABSTom Hegel
Void Balaur | The Sprawling Infrastructure of a Careless Mercenary
Void Balaur
2022-09-15SentinelOneJim Walter
From the Front Lines | Slam! Anatomy of a Publicly-Available Ransomware Builder
Slam
2022-09-15JPCERT/CCShusei Tomonaga
F5 BIG-IP Vulnerability (CVE-2022-1388) Exploited by BlackTech
Hipid
2022-09-02DataBreaches.netDissent
Customer data from hundreds of Indonesian and Malaysian restaurants hacked by DESORDEN
Desorden Group
2022-09-01safebreachTomer Bar
SafeBreach Labs Researchers Uncover New Remote Access Trojan (RAT)
2022-08-30CiscoVanja Svajcer
ModernLoader delivers multiple stealers, cryptominers and RATs
Coinminer DCRat ModernLoader RedLine Stealer SapphireMiner SystemBC
2022-08-25Trend MicroBahaa Yamany, Earle Maui Earnshaw, Jay Yaneza, Jeffrey Francis Bonaobra, Mohamed Fahmy, Nathaniel Gregory Ragasa
New Golang Ransomware Agenda Customizes Attacks (IoCs)
AgendaCrypt
2022-08-25Trend MicroBahaa Yamany, Earle Maui Earnshaw, Jay Yaneza, Jeffrey Francis Bonaobra, Mohamed Fahmy, Nathaniel Gregory Ragasa
New Golang Ransomware Agenda Customizes Attacks
AgendaCrypt
2022-08-24Trend MicroHitomi Kimura, Ryan Soliven
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus
Babuk
2022-08-24CrowdStrikeIoan Iacob, Iulian Madalin Ionita
The Anatomy of Wiper Malware, Part 2: Third-Party Drivers
2022-08-24Trend MicroHitomi Kimura, Ryan Soliven
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus (IoCs)
Babuk
2022-08-12CrowdStrikeIoan Iacob, Iulian Madalin Ionita
The Anatomy of Wiper Malware, Part 1: Common Techniques
Apostle CaddyWiper DEADWOOD DistTrack DoubleZero DUSTMAN HermeticWiper IsaacWiper IsraBye KillDisk Meteor Olympic Destroyer Ordinypt Petya Sierra(Alfa,Bravo, ...) StoneDrill WhisperGate ZeroCleare
2022-08-02cybleCyble Research Labs
Fake Atomic Wallet Website Distributing Mars Stealer
Mars Stealer
2022-07-20Advanced IntelligenceMarley Smith, Vitali Kremez, Yelisey Boguslavskiy
Anatomy of Attack: Truth Behind the Costa Rica Government Ransomware 5-Day Intrusion
Cobalt Strike
2022-07-18NetWitnessStefano Maccaglia, Will Gragido
FIN13 (Elephant Beetle): Viva la Threat! Anatomy of a Fintech Attack
FIN13
2022-07-18FortinetTom Hegel
From the Front Lines | 8220 Gang Massively Expands Cloud Botnet to 30,000 Infected Hosts
2022-07-07JPCERT/CCShusei Tomonaga
YamaBot Malware Used by Lazarus
YamaBot
2022-07-07Sentinel LABSTom Hegel
Targets of Interest - Russian Organizations Increasingly Under Attack By Chinese APTs
8.t Dropper Korlia Tonto Team
2022-07-05JPCERT/CCShusei Tomonaga
VSingle malware that obtains C2 server information from GitHub
VSingle
2022-07-01SYGNIANoam Lifshitz, Oren Biderman, Tomer Lahiyani
Luna Moth: The Actors Behind the Recent False Subscription Scams