Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-02-21YoroiAntonio Pirozzi, Luigi Martire, Pietro Melillo
Transparent Tribe: Four Years Later
Crimson RAT
2020-02-21ADEO DFIRADEO DFIR
APT10 Threat Analysis Report
CHINACHOPPER HTran MimiKatz PlugX Quasar RAT
2020-02-21KELARaveed Laeb
Exploring the Genesis Supply Chain for Fun and Profit: Part 1 – Misadventures in GUIDology
Azorult
2020-02-20McAfeeChristiaan Beek, Darren Fitzpatrick, Eamonn Ryan
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II
Cobalt Strike LockerGoga Maze MegaCortex
2020-02-20NCSC UKNCSC UK
UK condemns Russia's GRU over Georgia cyber-attacks
2020-02-20JPCERT/CCKota Kino
日本国内の組織を狙ったマルウエアLODEINFO
LODEINFO
2020-02-20ZDNetCatalin Cimpanu
Croatia's largest petrol station chain impacted by cyber-attack
Clop
2020-02-20Cisco TalosAsheer Malhotra
ObliqueRAT: New RAT hits victims' endpoints via malicious documents
Oblique RAT
2020-02-20Carbon BlackTakahiro Haruyama
Threat Analysis: Active C2 Discovery Using Protocol Emulation Part2 (Winnti 4.0)
Winnti
2020-02-20GovCERT.chGovCERT.ch
Analysis of an Unusual HawkEye Sample
HawkEye Keylogger
2020-02-19KELAKELA’s Research Team
Uncovering the Anonymity Cloak
2020-02-19TOPSECTOPSEC
新冠肺炎疫情期间APT攻击热点追踪报告
2020-02-19LexfoLexfo
The Lazarus Constellation A study on North Korean malware
FastCash AppleJeus BADCALL Bankshot Brambul Dtrack Duuzer DYEPACK ELECTRICFISH HARDRAIN Hermes HOPLIGHT Joanap KEYMARBLE Kimsuky MimiKatz MyDoom NACHOCHEESE NavRAT PowerRatankba RokRAT Sierra(Alfa,Bravo, ...) Volgmer WannaCryptor
2020-02-19Team CymruTeam Cymru
Azorult – what we see using our own tools
Azorult
2020-02-19FireEyeFireEye
M-Trends 2020
Cobalt Strike Grateful POS LockerGoga QakBot TrickBot
2020-02-19YoroiMarco Ramilli
Uncovering New Magecart Implant Attacking eCommerce
magecart
2020-02-18Personal Blog of Christophe Tafani-DereeperChristophe Tafani-Dereeper
Hidden in PEB Sight: Hiding Windows API Imports With a Custom Loader
2020-02-18Trend MicroCedric Pernet, Daniel Lunghi, Jamz Yaneza, Kenney Lu
Uncovering DRBControl
Clambling
2020-02-18Sophos LabsLuca Nagy
Nearly a quarter of malware now communicates using TLS
Dridex IcedID TrickBot
2020-02-18PWC UKKris McConkey, Sveva Vittoria Scenarelli
Tracking ‘Kimsuky’, the North Korea-based cyber espionage group: Part 1
Kimsuky