Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-03-15insomniacs(Medium)Asuna Amawaka
Dad! There’s A Rat In Here!
DADSTACHE
2020-03-15The Shadowserver FoundationShadowserver Foundation
Has The Sun Set On The Necurs Botnet?
Andromeda Cutwail Kelihos Necurs Pushdo
2020-03-13ComaeMatt Suiche
Yet Another Active Email Campaign With Malicious Excel Files Identified
Zloader
2020-03-12Recorded FutureInsikt Group
Swallowing the Snake’s Tail: Tracking Turla Infrastructure
TwoFace Mosquito
2020-03-12Amnesty InternationalAmnesty International
Targeted Surveillance Attacks in Uzbekistan: An Old Threat with New Techniques
Void Balaur
2020-03-12Check Point ResearchCheck Point
Vicious Panda: The COVID Campaign
8.t Dropper Vicious Panda
2020-03-12Obective SeeThomas Reed
The case of the fly on the wall
FruitFly
2020-03-12ID RansomwareAndrew Ivanov
Teslarvng Ransomware Yakuza Ransomware
Yakuza
2020-03-12CyberbitDor Neemani, Hod Gavriel, Omer Fishel
Lost in the Maze
Maze
2020-03-12Digital ShadowsAlex Guirakhoo
How cybercriminals are taking advantage of COVID-19: Scams, fraud, and misinformation
Emotet
2020-03-12LimerBoy
Adamantium-Thief
Adamantium Thief
2020-03-12Check PointCheck Point Research
Vicious Panda: The COVID Campaign
8.t Dropper BYEBY Enfal Korlia Poison Ivy
2020-03-12ESET ResearchMatthieu Faou
Tracking Turla: New backdoor delivered via Armenian watering holes
LightNeuron Mosquito NetFlash Skipper
2020-03-12Recorded FutureInsikt Group
Swallowing the Snake’s Tail: Tracking Turla Infrastructure
Mosquito Sinowal
2020-03-11MalwareMustDiemmd0xff
RHOMBUS an ELF bot installer/dropper
RHOMBUS
2020-03-11Trend MicroFeike Hacquebord
Pawn Storm in 2019: A Year of Scanning and Credential Phishing on High-Profile Targets
2020-03-11Twitter (@casual_malware)casual_malware
Tweet on FireBird RAT
FireBird RAT
2020-03-11Twitter (@raashidbhatt)Raashid Bhat
Tweet on Emotet Deobfuscation with Video
Emotet
2020-03-11Virus BulletinGhareeb Saad, Michael Raggi
Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers
8.t Dropper
2020-03-11Trend MicroJaromír Hořejší, Joseph Chen
Operation Overtrap Targets Japanese Online Banking Users Via Bottle Exploit Kit and Brand-New Cinobi Banking Trojan
Cinobi