Click here to download all references as Bib-File.•
2020-07-09
⋅
Gdata
⋅
ServHelper: Hidden Miners ServHelper |
2020-07-09
⋅
360 netlab
⋅
An Update for a Very Active DDos Botnet: Moobot MooBot |
2020-07-09
⋅
Checkpoint
⋅
New Joker variant hits Google Play with an old trick Joker |
2020-07-09
⋅
ESET Research
⋅
More evil: A deep look at Evilnum and its toolset EVILNUM More_eggs EVILNUM TerraPreter TerraStealer TerraTV Evilnum |
2020-07-08
⋅
ThaiCERT
⋅
Threat Group Cards: A Threat Actor Encyclopedia TA516 TA547 TA554 TA555 |
2020-07-08
⋅
SentinelOne
⋅
“EvilQuest” Rolls Ransomware, Spyware & Data Theft Into One EvilQuest |
2020-07-08
⋅
Bitdefender
⋅
Kingminer –a Crypto-Jacking Botnet Under the Scope Kingminer |
2020-07-08
⋅
Trend Micro
⋅
Ransomware Report: Avaddon and New Techniques Emerge, Industrial Sector Targeted Avaddon |
2020-07-08
⋅
Trend Micro
⋅
New Mirai Variant Expands Arsenal, Exploits CVE-2020-10173 Mirai |
2020-07-08
⋅
Seqrite
⋅
Operation ‘Honey Trap’: APT36 Targets Defense Organizations in India Crimson RAT |
2020-07-08
⋅
COLUMBIA | SIPA
⋅
Named But Hardly Shamed: What is the Impact of Information Disclosures on an APT Operations? |
2020-07-08
⋅
xunison
⋅
Analysis of SamoRAT SamoRAT |
2020-07-08
⋅
Medium (@sevdraven)
⋅
How to unpack Chinoxy backdoor and decipher the configuration of the backdoor Chinoxy |
2020-07-08
⋅
Intel 471
⋅
Iran’s domestic espionage: Lessons from recent data leaks |
2020-07-08
⋅
Restricting SMB-based lateral movement in a Windows environment |
2020-07-08
⋅
VMWare Carbon Black
⋅
TAU Threat Discovery: Conti Ransomware Conti |
2020-07-07
⋅
Department of Justice
⋅
United States District Court for the Eastern District of Washington vs. Li Xiaoyu (oro0lxy) and Dong Jiazhi BRONZE SPRING |
2020-07-07
⋅
FireEye
⋅
Configuring a Windows Domain to Dynamically Analyze an Obfuscated Lateral Movement Tool |
2020-07-07
⋅
⋅
ID Ransomware
⋅
SilentDeath Ransomware |
2020-07-07
⋅
Hornetsecurity
⋅
Clop, Clop! It’s a TA505 HTML malspam analysis Clop Get2 |