Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-02-08FireEyeMichael Bailey
Reversing the Gophe SPambot: Confronting COM Code and Surmounting STL Snags
Gophe
2020-02-08MyCERTMyCERT
MA-774.022020: MyCERT Advisory - Espionage Campaign Based On Technical Indicators
APT40
2020-02-08PICUS SecuritySüleyman Özarslan
Emotet Technical Analysis - Part 2 PowerShell Unveiled
Emotet
2020-02-07Bleeping ComputerSergiu Gatlan
TA505 Hackers Behind Maastricht University Ransomware Attack
Clop
2020-02-07Medium CSIS TechblogBenoît Ancel
InstallCapital — When AdWare Becomes Pay-per-Install Cyber-Crime
DreamBot Glupteba
2020-02-07Medium SebdravenSébastien Larinier
APT 40 in Malaysia
DADJOKE
2020-02-07RiskIQJordan Herman
Magecart Group 12’s Latest: Actors Behind Attacks on Olympics Ticket Re-sellers Deftly Swapped Domains to Continue Campaign
magecart
2020-02-07Binary DefenseJames Quinn
Emotet Evolves With New Wi-Fi Spreader
Emotet
2020-02-06DomainToolsChad Anderson
Finding Additional Indicators With a SeaTurtle Deep Dive in Passive DNS Within DomainTools Iris
Sea Turtle
2020-02-06ID RansomwareAndrew Ivanov
Sfile Ransomware
Sfile
2020-02-06PrevailionDanny Adamitis
The Triune Threat: MasterMana Returns
Azorult Loki Password Stealer (PWS)
2020-02-06GdataKarsten Hahn
40,000 CryptBot Downloads per Day: Bitbucket Abused as Malware Slinger
CryptBot
2020-02-06Bleeping ComputerLawrence Abrams
Ransomware Exploits GIGABYTE Driver to Kill AV Processes
RobinHood
2020-02-06SophosAndrew Brandt, Mark Loman
Living off another land: Ransomware borrows vulnerable driver to remove security software
RobinHood
2020-02-06IronNetJonathan Lepore
DNS Tunneling Series, Part 3: The Siren Song of RogueRobin
RogueRobin
2020-02-05Bleeping ComputerLawrence Abrams
Mailto (NetWalker) Ransomware Targets Enterprise Networks
Mailto
2020-02-05FireEyeAndrew Moore, Blaine Stancill, Genevieve Stark, Rick Cole
STOMP 2 DIS: Brilliance in the (Visual) Basics
MINEBRIDGE
2020-02-05SentinelOneVitali Kremez
Pro-Russian CyberSpy Gamaredon Intensifies Ukrainian Security Targeting
Pteranodon
2020-02-05CybereasonAssaf Dahan, Lior Rochberger
The Hole in the Bucket: Attackers Abuse Bitbucket to Deliver an Arsenal of Malware
Amadey Azorult Predator The Thief STOP Vidar
2020-02-04Security-in-BitsSecurity-in-Bits
Similarity between Qealler/Pyrogenic variants -Part 0x3
Qealler