Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-10-05BleepingComputerLawrence Abrams
HildaCrypt Ransomware Developer Releases Decryption Keys
HILDACRYPT
2019-10-04Virus BulletinJaeki Kim, Kyoung-ju Kwak, Min-Chang Jang
Kimsuky group: tracking the king of the spear-phishing
Kimsuky
2019-10-04ID RansomwareAndrew Ivanov
ScareCrow Ransomware
2019-10-03ContextisContextis
AVIVORE – Hunting Global Aerospace through the Supply Chain
Avivore
2019-10-03ESET ResearchESET Research
Casbaneiro: Dangerous cooking with a secret ingredient
Metamorfo
2019-10-03ContextisContextis
Context Identifies new AVIVORE threat group
Avivore
2019-10-03ComputerWeeklyAlex Scroxton
New threat group behind Airbus cyber attacks, claim researchers
PlugX Avivore
2019-10-03Kaspersky LabsGReAT
COMpfun successor Reductor infects files on the fly to compromise TLS traffic
COMpfun
2019-10-03Palo Alto Networks Unit 42Alex Hinchliffe
PKPLUG: Chinese Cyber Espionage Group Attacking Asia
HenBox Farseer PlugX
2019-10-03Kim Zetter
Researchers Say They Uncovered Uzbekistan Hacking Operations Due to Spectacularly Bad OPSEC
Chainshot
2019-10-02Virus BulletinAseel Kayal, Lotem Finkelstein
Domestic Kitten: an Iranian surveillance program
FurBall
2019-10-02One Night in NorfolkKevin Perlow
Another Lazarus Injector
2019-10-02Dissecting MalwareMarius Genheimer
Nicht so goot - Breaking down Gootkit and Jasper (+ FTCODE)
FTCODE JasperLoader GootKit
2019-10-02tcontre
DCRAT malware Evades SandBox that use Fake Internet by using the Google public DNS IP address
DCRat
2019-10-02Virus BulletinDaniel Lunghi, Jaromír Hořejší
Abusing third-party cloud services in targeted attacks
BadNews SLUB
2019-10-02Politie NLPolitie NL
Servers botnet offline
Mirai
2019-10-02CertegoMarco Bompani, Matteo Lodi
Malware Tales: FTCODE
FTCODE
2019-10-02McAfeeMcAfee Labs
McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us
Gandcrab REvil
2019-10-01SophosMichael Wood, Rajesh Nataraj, Vikas Singh
Lemon_Duck PowerShell malware cryptojacks enterprise networks
Lemon Duck
2019-10-01CrowdStrikeKarl Scheuerman, Piotr Wojtyla
Don't miss the forest for the trees gleaning hunting value from too much intrusion data
Winnti