Click here to download all references as Bib-File.•
2020-02-24
⋅
Max Kersten's Blog
⋅
Closing in on MageCart 12 magecart |
2020-02-22
⋅
FR3D.HK
⋅
Nexus - Just another stealer |
2020-02-22
⋅
Comae
⋅
Active Email Campaign Identified With Malicious Excel Files |
2020-02-22
⋅
Objective-See
⋅
Weaponizing a Lazarus Group Implant: repurposing a 1st-stage loader, to execute custom 'fileless' payloads AppleJeus |
2020-02-21
⋅
Yoroi
⋅
Transparent Tribe: Four Years Later Crimson RAT |
2020-02-21
⋅
ADEO DFIR
⋅
APT10 Threat Analysis Report CHINACHOPPER HTran MimiKatz PlugX Quasar RAT |
2020-02-21
⋅
KELA
⋅
Exploring the Genesis Supply Chain for Fun and Profit: Part 1 – Misadventures in GUIDology Azorult |
2020-02-20
⋅
McAfee
⋅
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II Cobalt Strike LockerGoga Maze MegaCortex |
2020-02-20
⋅
NCSC UK
⋅
UK condemns Russia's GRU over Georgia cyber-attacks |
2020-02-20
⋅
⋅
JPCERT/CC
⋅
日本国内の組織を狙ったマルウエアLODEINFO LODEINFO |
2020-02-20
⋅
ZDNet
⋅
Croatia's largest petrol station chain impacted by cyber-attack Clop |
2020-02-20
⋅
Cisco Talos
⋅
ObliqueRAT: New RAT hits victims' endpoints via malicious documents Oblique RAT |
2020-02-20
⋅
Carbon Black
⋅
Threat Analysis: Active C2 Discovery Using Protocol Emulation Part2 (Winnti 4.0) Winnti |
2020-02-20
⋅
GovCERT.ch
⋅
Analysis of an Unusual HawkEye Sample HawkEye Keylogger |
2020-02-19
⋅
KELA
⋅
Uncovering the Anonymity Cloak |
2020-02-19
⋅
⋅
TOPSEC
⋅
新冠肺炎疫情期间APT攻击热点追踪报告 |
2020-02-19
⋅
Lexfo
⋅
The Lazarus Constellation A study on North Korean malware FastCash AppleJeus BADCALL Bankshot Brambul Dtrack Duuzer DYEPACK ELECTRICFISH HARDRAIN Hermes HOPLIGHT Joanap KEYMARBLE Kimsuky MimiKatz MyDoom NACHOCHEESE NavRAT PowerRatankba RokRAT Sierra(Alfa,Bravo, ...) Volgmer WannaCryptor |
2020-02-19
⋅
Team Cymru
⋅
Azorult – what we see using our own tools Azorult |
2020-02-19
⋅
FireEye
⋅
M-Trends 2020 Cobalt Strike Grateful POS LockerGoga QakBot TrickBot |
2020-02-19
⋅
Yoroi
⋅
Uncovering New Magecart Implant Attacking eCommerce magecart |