Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-07-09GdataG DATA Security Lab
ServHelper: Hidden Miners
ServHelper
2020-07-09360 netlabAlex Turing, Hui Wang
An Update for a Very Active DDos Botnet: Moobot
MooBot
2020-07-09CheckpointAviran Hazum, Bogdan Melnykov, Israel Wernik
New Joker variant hits Google Play with an old trick
Joker
2020-07-09ESET ResearchMatías Porolli
More evil: A deep look at Evilnum and its toolset
EVILNUM More_eggs EVILNUM TerraPreter TerraStealer TerraTV Evilnum
2020-07-08ThaiCERTThaiCERT
Threat Group Cards: A Threat Actor Encyclopedia
TA516 TA547 TA554 TA555
2020-07-08SentinelOnePhil Stokes
“EvilQuest” Rolls Ransomware, Spyware & Data Theft Into One
EvilQuest
2020-07-08BitdefenderBogdan Botezatu, Janos Gergo Szeles
Kingminer –a Crypto-Jacking Botnet Under the Scope
Kingminer
2020-07-08Trend MicroTrend Micro Threat Research Team
Ransomware Report: Avaddon and New Techniques Emerge, Industrial Sector Targeted
Avaddon
2020-07-08Trend MicroTrend Micro
New Mirai Variant Expands Arsenal, Exploits CVE-2020-10173
Mirai
2020-07-08SeqriteKalpesh Mantri
Operation ‘Honey Trap’: APT36 Targets Defense Organizations in India
Crimson RAT
2020-07-08COLUMBIA | SIPAJennifer Keltz, John Patrick Dees, John Sakellariadis, Katherine von Ofenheim, Lan Pelekis, Matthew Armelli, Max Egar, Neal Pollard, Stuart Caudill, Vipratap Vikram Singh
Named But Hardly Shamed: What is the Impact of Information Disclosures on an APT Operations?
2020-07-08xunisonxunison
Analysis of SamoRAT
SamoRAT
2020-07-08Medium (@sevdraven)Sébastien Larinier
How to unpack Chinoxy backdoor and decipher the configuration of the backdoor
Chinoxy
2020-07-08Intel 471Intel 471
Iran’s domestic espionage: Lessons from recent data leaks
2020-07-08Palantir
Restricting SMB-based lateral movement in a Windows environment
2020-07-08VMWare Carbon BlackBrian Baskin
TAU Threat Discovery: Conti Ransomware
Conti
2020-07-07Department of JusticeDepartment of Justice
United States District Court for the Eastern District of Washington vs. Li Xiaoyu (oro0lxy) and Dong Jiazhi
BRONZE SPRING
2020-07-07FireEyeMatthew Haigh, Trevor Haskell
Configuring a Windows Domain to Dynamically Analyze an Obfuscated Lateral Movement Tool
2020-07-07ID RansomwareAndrew Ivanov
SilentDeath Ransomware
2020-07-07HornetsecurityHornetsecurity Security Lab
Clop, Clop! It’s a TA505 HTML malspam analysis
Clop Get2