Click here to download all references as Bib-File.•
2020-05-08
⋅
MITRE
⋅
Inception PowerShower LaZagne |
2020-05-08
⋅
Twitter (@sysopfb)
⋅
Tweet on GuLoader anti analysis techniques CloudEyE |
2020-05-08
⋅
Kaspersky Labs
⋅
Naikon’s Aria Aria-body |
2020-05-07
⋅
paloalto LIVEcommunity
⋅
How to stop MortiAgent Malware using the snort rule? MoriAgent |
2020-05-07
⋅
Council on Foreign Relations
⋅
Axiom APT17 |
2020-05-07
⋅
Bitdefender
⋅
GoGoogle Decryption Tool GoGoogle |
2020-05-07
⋅
Der Spiegel
⋅
Ruhr-Universität Bochum meldet Computerangriff |
2020-05-07
⋅
Venom Remote Administration Tool (from Venom Software!) Venom RAT |
2020-05-07
⋅
Red Canary
⋅
Detecting COR_PROFILER manipulation for persistence |
2020-05-07
⋅
Red Canary
⋅
Introducing Blue Mockingbird |
2020-05-07
⋅
REDTEAM.PL
⋅
Sodinokibi / REvil ransomware Maze MimiKatz REvil |
2020-05-07
⋅
FireEye Inc
⋅
Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents Maze |
2020-05-07
⋅
AVAR
⋅
The North Korean AV Anthology: a unique look on DPRK’s Anti-Virus market Volgmer |
2020-05-07
⋅
Twitter (@ESETresearch)
⋅
Tweet on PeddleCheap packed with Winnti packer PeddleCheap |
2020-05-07
⋅
Github (mlodic)
⋅
Ursnif beacon decryptor Gozi ISFB |
2020-05-07
⋅
The Citizenlab
⋅
We Chat, They Watch: How International Users Unwittingly Build up WeChat’s Chinese Censorship Apparatus |
2020-05-07
⋅
Checkpoint
⋅
Naikon APT: Cyber Espionage Reloaded Aria-body |
2020-05-06
⋅
Prevailion
⋅
Phantom in the Command Shell EVILNUM |
2020-05-06
⋅
Yoroi
⋅
New Cyber Operation Targets Italy: Digging Into the Netwire Attack Chain NetWire RC |
2020-05-06
⋅
Cyber Struggle
⋅
Leery Turtle Threat Report CageyChameleon |