Click here to download all references as Bib-File.•
2020-08-27
⋅
fmnagisa wordpress
⋅
Revisiting EquationGroup’s FANNY… or is it DEMENTIAWHEEL? DoubleFantasy Fanny |
2020-08-27
⋅
Hatching.io
⋅
Smokeloader Analysis and More Family Detections SmokeLoader |
2020-08-27
⋅
Twitter (@MsftSecIntel)
⋅
Tweet on Anubis Stealer Anubis |
2020-08-27
⋅
Palo Alto Networks Unit 42
⋅
Cetus: Cryptojacking Worm Targeting Docker Daemons Cetus |
2020-08-27
⋅
ClearSky
⋅
The Kittens Are Back in Town 3: Charming Kitten Campaign Evolved and Deploying Spear-Phishing link by WhatsApp |
2020-08-27
⋅
Checkpoint
⋅
An Old Bot’s Nasty New Tricks: Exploring Qbot’s Latest Attack Methods QakBot |
2020-08-27
⋅
MalWatch
⋅
Win.Trojan.AgentTesla - Malware analysis & threat intelligence report Agent Tesla |
2020-08-26
⋅
CISA
⋅
Alert (AA20-239A): FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks FastCash |
2020-08-26
⋅
CISA
⋅
MAR-10301706-1.v1 - North Korean Remote Access Tool: ECCENTRICBANDWAGON PSLogger |
2020-08-26
⋅
CISA
⋅
MAR-10301706-2.v1 - North Korean Remote Access Tool: VIVACIOUSGIFT NACHOCHEESE |
2020-08-26
⋅
Proofpoint
⋅
Threat Actor Profile: TA2719 Uses Colorful Lures to Deliver RATs in Local Languages AsyncRAT Nanocore RAT TA2719 |
2020-08-26
⋅
Lab52
⋅
A twisted malware infection chain Agent Tesla Loki Password Stealer (PWS) |
2020-08-26
⋅
Max Kersten's Blog
⋅
ReZer0v4 loader MASS Logger |
2020-08-26
⋅
Bleeping Computer
⋅
SunCrypt Ransomware sheds light on the Maze ransomware cartel SunCrypt |
2020-08-26
⋅
Kaspersky Labs
⋅
Transparent Tribe: Evolution analysis, part 2 AhMyth Crimson RAT Oblique RAT |
2020-08-25
⋅
Aqua Nautilus
⋅
Deep Analysis of TeamTNT Techniques Using Container Images to Attack TeamTNT Tsunami XMRIG |
2020-08-25
⋅
KELA
⋅
How Ransomware Gangs Find New Monetization Schemes and Evolve in Marketing Avaddon Clop DarkSide DoppelPaymer Mailto Maze MedusaLocker Mespinoza Nefilim RagnarLocker REvil Sekhmet |
2020-08-25
⋅
ID Ransomware
⋅
Cyrat Ransomware Cyrat |
2020-08-25
⋅
BleepingComputer
⋅
Ryuk successor Conti Ransomware releases data leak site Conti |
2020-08-25
⋅
⋅
360 Threat Intelligence Center
⋅
Darkhotel (APT-C-06) organized multiple attacks using the Thinmon backdoor framework to reveal the secrets ThinMon |