Click here to download all references as Bib-File.•
2020-07-16
⋅
CISA
⋅
Malware Analysis Report (AR20-198B) WellMess |
2020-07-16
⋅
PWC UK
⋅
How WellMess malware has been used to target Covid-19 vaccines elf.wellmess WellMess |
2020-07-16
⋅
F-Secure
⋅
US, UK, and Canada’s COVID-19 research targeted by APT29 |
2020-07-16
⋅
Wired
⋅
Iranian Spies Accidentally Leaked Videos of Themselves Hacking |
2020-07-16
⋅
SecurityIntelligence
⋅
New Research Exposes Iranian Threat Group (APT35/ITG18) Operations |
2020-07-16
⋅
ESET Research
⋅
Mac cryptocurrency trading application rebranded, bundled with malware Gmera |
2020-07-16
⋅
ESET Research
⋅
High‑profile Twitter accounts hacked to promote Bitcoin scam |
2020-07-16
⋅
Cybereason
⋅
A Bazar of Tricks: Following Team9’s Development Cycles BazarBackdoor |
2020-07-15
⋅
Mandiant
⋅
Financially Motivated Actors Are Expanding Access Into OT: Analysis of Kill Lists That Include OT Processes Used With Seven Malware Families Clop DoppelPaymer LockerGoga Maze MegaCortex Nefilim Snake |
2020-07-15
⋅
Relativity
⋅
An in-depth analysis of SpyNote remote access trojan SpyNote |
2020-07-15
⋅
ZDNet
⋅
Chinese state hackers target Hong Kong Catholic Church PlugX |
2020-07-15
⋅
Yahoo News
⋅
Exclusive: Secret Trump order gives CIA more powers to launch cyberattacks |
2020-07-15
⋅
N1ght-W0lf Blog
⋅
Deep Analysis of QBot Banking Trojan QakBot |
2020-07-15
⋅
Advanced Intelligence
⋅
Inside REvil Extortionist “Machine”: Predictive Insights Gandcrab REvil |
2020-07-15
⋅
Intel 471
⋅
Flowspec – TA505’s bulletproof hoster of choice Get2 |
2020-07-15
⋅
Johannes Bader's Blog
⋅
The Defective Domain Generation Algorithm of BazarBackdoor BazarBackdoor |
2020-07-14
⋅
International Journal of Intelligence and Counter Intelligence
⋅
Cyber Threat Intelligence: A Product Without aProcess? |
2020-07-14
⋅
Cyborg Security
⋅
PYTHON MALWARE ON THE RISE Poet RAT PyLocky SEADADDY |
2020-07-14
⋅
CrowdStrike
⋅
Manufacturing Industry in the Adversaries’ Crosshairs ShadowPad Snake |
2020-07-14
⋅
blog.rootshell.be
⋅
Simple DGA Spotted in a Malicious PowerShell |