Click here to download all references as Bib-File.•
2019-12-23
⋅
YouTube
⋅
Video: Malware Analysis | WSHRAT Visual Basic RAT (C2 Replication) Houdini |
2019-12-23
⋅
POS Malware Used at Fuel Pumps Grateful POS |
2019-12-22
⋅
Casual Analysis of Valak C2 Valak |
2019-12-21
⋅
Decrypt
⋅
How ransomware exploded in the age of Bitcoin Ryuk |
2019-12-21
⋅
MalwareInDepth
⋅
Shamoon 2012 Complete Analysis DistTrack |
2019-12-21
⋅
Twitter (@zlab_team)
⋅
Tweet on Possible New Threatactor JSOutProx |
2019-12-20
⋅
Trustwave
⋅
Undressing the REvil REvil |
2019-12-20
⋅
Yoroi
⋅
Unveiling JsOutProx: A New Enterprise Grade Implant JSOutProx |
2019-12-20
⋅
Binary Defense
⋅
An Updated ServHelper Tunnel Variant ServHelper |
2019-12-20
⋅
Twitter (@ItsReallyNick)
⋅
Tweet on GRUNT payload GRUNT |
2019-12-19
⋅
Youtube (FireEye Inc.)
⋅
Do You Know What's On Your Exchange Server? LightNeuron |
2019-12-19
⋅
⋅
VinCSS
⋅
[RE009] Analysis of malicious code "PLAN, KEY TASKS IN 2020.doc" attached to phishing email Unidentified 074 (Downloader) |
2019-12-19
⋅
KrebsOnSecurity
⋅
Inside ‘Evil Corp,’ a $100M Cybercrime Menace Dridex Gameover P2P Zeus Evil Corp |
2019-12-19
⋅
Fox-IT
⋅
Operation Wocao: Shining a light on one of China’s hidden hacking groups XServer |
2019-12-19
⋅
Malwarebytes
⋅
Threat spotlight: the curious case of Ryuk ransomware Ryuk |
2019-12-19
⋅
Fox-IT
⋅
Operation Wocao : Shining a light on one of China’s hidden hacking groups APT20 Operation Wocao |
2019-12-19
⋅
Twitter (@malware_traffic)
⋅
Tweet on Valak Malware Valak |
2019-12-18
⋅
MICROSOFT CORPORATION, Plaintiff, v. JOHN DOES 1-2, CONTROLLING A COMPUTER NETWORK THEREBY INJURING PLAINTIFF AND ITS CUSTOMERS BabyShark Kimsuky |
2019-12-18
⋅
Github (albertzsigovits)
⋅
Maze ransomware Maze |
2019-12-18
⋅
Github (psrok1)
⋅
IcedID PNG Extractor IcedID |