Click here to download all references as Bib-File.•
2020-04-15
⋅
Zscaler
⋅
Multistage FreeDom loader used in Aggah Campaign to spread Nanocore and AZORult Azorult Nanocore RAT |
2020-04-15
⋅
US-CERT
⋅
Guidance on the North Korean Cyber Threat |
2020-04-15
⋅
Lookout
⋅
Nation-state Mobile Malware Targets Syrians with COVID-19 Lures |
2020-04-15
⋅
How Analysing an AgentTesla Could Lead To Attackers Inbox - Part II Agent Tesla |
2020-04-14
⋅
SecurityIntelligence
⋅
TA505 Continues to Infect Networks With SDBbot RAT SDBbot TinyMet TA505 |
2020-04-14
⋅
⋅
Qianxin
⋅
The Lazarus APT organization uses the new crown epidemic bait to target a targeted attack analysis of a country CRAT |
2020-04-14
⋅
Intrinsec
⋅
Deobfuscating and hunting for OSTAP, Trickbot’s dropper and best friend ostap TrickBot |
2020-04-14
⋅
Intel 471
⋅
Understanding the relationship between Emotet, Ryuk and TrickBot Emotet Ryuk TrickBot |
2020-04-14
⋅
Bleeping Computer
⋅
RagnarLocker ransomware hits EDP energy giant, asks for €10M RagnarLocker |
2020-04-14
⋅
Emotet JavaScript downloader Unidentified JS 003 (Emotet Downloader) |
2020-04-14
⋅
Palo Alto Networks Unit 42
⋅
Malicious Attackers Target Government and Medical Organizations With COVID-19 Themed Phishing Campaigns Agent Tesla EDA2 |
2020-04-13
⋅
K7 Security
⋅
GuLoader delivers RATs and Spies in Disguise CloudEyE |
2020-04-13
⋅
Blackberry
⋅
Threat Spotlight: Gootkit Banking Trojan Azorult GootKit |
2020-04-13
⋅
Twitter (MalwareHunterTeam)
⋅
Tweet on XploitSPY XploitSPY |
2020-04-13
⋅
Centurylink
⋅
New Mozi Malware Family Quietly Amasses IoT Bots Mozi |
2020-04-13
⋅
Dissecting Malware
⋅
The Blame Game - About False Flags and overwritten MBRs Glupteba MBR Locker |
2020-04-13
⋅
How Analysing an AgentTesla Could Lead To Attackers Inbox - Part I Agent Tesla |
2020-04-13
⋅
Palo Alto Networks Unit 42
⋅
APT41 Using New Speculoos Backdoor to Target Organizations Globally Speculoos APT41 |
2020-04-12
⋅
Twitter (@struppigel)
⋅
Tweet on KokoKrypt decryption KokoKrypt |
2020-04-12
⋅
InfoSec Handlers Diary Blog
⋅
Dynamic analysis technique to get decrypted KPOT Malware KPOT Stealer |