Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-09-19NSHCThreatRecon Team
Hagga of SectorH01 continues abusing Bitly, Blogger and Pastebin to deliver RevengeRAT and NanoCore
Nanocore RAT Revenge RAT
2019-09-19Trend MicroMaverick Pascual
Fileless Cryptocurrency-Miner GhostMiner Weaponizes WMI Objects, Kills Other Cryptocurrency-Mining Payloads
GhostMiner
2019-09-18SophosLabs UncutPeter Mackenzie
The WannaCry hangover
WannaCryptor
2019-09-18SymantecSecurity Response Attack Investigation Team
Tortoiseshell Group Targets IT Providers in Saudi Arabia in Probable Supply Chain Attacks
SysKit Tortoiseshell
2019-09-18IronNetJonathan Lepore
Chirp of the PoisonFrog
BONDUPDATER
2019-09-18JPCERT/CCShusei Tomonaga
Malware Used by BlackTech after Network Intrusion
PLEAD
2019-09-17SophosLabsPeter Mackenzie
WannaCry Aftershock
WannaCryptor
2019-09-17FortinetJoie Salvio
Nemty Ransomware 1.0: A Threat in its Early Stage
Nemty
2019-09-17TalosChristopher Evans, David Liebenberg
Cryptocurrency miners aren’t dead yet: Documenting the voracious but simple “Panda”
Ghost RAT
2019-09-17Bleeping ComputerLawrence Abrams
TFlower Ransomware - The Latest Attack Targeting Businesses
TFlower
2019-09-16MalwarebytesThreat Intelligence Team
Emotet is back: botnet springs back to life with new spam campaign
Emotet
2019-09-14Github (jeFF0Falltrades)Jeff Archer
WSH RAT (A variant of H-Worm/Houdini)
Houdini
2019-09-13MITREMITRE ATT&CK
Machete
El Machete
2019-09-12AvastAdolf Středa, Luigino Camastra
The tangle of WiryJMPer’s obfuscation
NetWire RC
2019-09-12ZscalerRohit Chaturvedi, Sahil Antil
InnfiRAT: A new RAT aiming for your cryptocurrency and more
win.innfirat
2019-09-12Github (cryptogramfan)Alex Holland
Ostap Deobfuscation script
ostap
2019-09-12Virus BulletinKamila Babayeva, Maria Rigaki, Sebastian García, Veronica Valeros
A STUDY OF MACHETE CYBER ESPIONAGE OPERATIONS IN LATIN AMERICA
Machete
2019-09-11Danny Adamitis
Autumn Aperture Report
Kimsuky
2019-09-11VolexitySean Koessel, Steven Adair
Vulnerable Private Networks: Corporate VPNs Exploited in the Wild
2019-09-11PrevailionDanny Adamitis, Elizabeth Wharton
Autumn Aperture
Kimsuky