Click here to download all references as Bib-File.•
2023-07-28
⋅
CISA
⋅
MAR-10454006-r2.v1 SEASPY Backdoor SEASPY |
2023-07-28
⋅
MAR-10454006-r1.v2 SUBMARINE Backdoor |
2023-07-28
⋅
CISA
⋅
CISA Releases Malware Analysis Reports on Barracuda Backdoors SEASPY |
2023-07-28
⋅
Team Cymru
⋅
Inside the IcedID BackConnect Protocol (Part 2) IcedID |
2023-07-27
⋅
Bankinfo Security
⋅
Are Akira Ransomware's Crypto-Locking Malware Days Numbered? Akira Ryuk |
2023-07-27
⋅
SOCRadar
⋅
Dark Web Profile: 8Base Ransomware 8Base |
2023-07-27
⋅
X (@BlackLotusLabs)
⋅
Tweet on update on AVrecon bot's migration to new infrastructure AVrecon |
2023-07-27
⋅
Recorded Future
⋅
BlueBravo Adapts to Target Diplomatic Entities with GraphicalProton Malware GraphDrop GraphicalNeutrino QUARTERRIG |
2023-07-26
⋅
Into the tank with Nitrogen Nitrogen Loader |
2023-07-26
⋅
DataBreaches.net
⋅
Major Malaysian water utilities company hit by hackers; Ranhill offline; hackers claim databases and backups deleted Desorden Group |
2023-07-26
⋅
SPUR
⋅
Christmas in July: A finely wrapped Malware Proxy Service AVrecon |
2023-07-26
⋅
cocomelonc
⋅
Malware development trick - part 35: Store payload in alternate data streams. Simple C++ example. Valak POWERSOURCE Gazer PowerDuke |
2023-07-26
⋅
⋅
Weixin
⋅
APT29 recently faked the German embassy and issued a malicious PDF file BEATDROP Unidentified 107 (APT29) |
2023-07-26
⋅
Arctic Wolf
⋅
Conti and Akira: Chained Together Akira Conti |
2023-07-25
⋅
K7 Security
⋅
Akira’s Play with Linux Akira |
2023-07-25
⋅
Zscaler
⋅
Hibernating Qakbot: A Comprehensive Study and In-depth Campaign Analysis QakBot |
2023-07-25
⋅
KrebsOnSecurity
⋅
Who and What is Behind the Malware Proxy Service SocksEscort? AVrecon |
2023-07-25
⋅
Avertium
⋅
EVOLUTION OF RUSSIAN APT29 – NEW ATTACKS AND TECHNIQUES UNCOVERED GraphDrop |
2023-07-25
⋅
splunk
⋅
Amadey Threat Analysis and Detections Amadey |
2023-07-24
⋅
AhnLab
⋅
Lazarus Threat Group Attacking Windows Servers to Use as Malware Distribution Points |