Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-02-17US-CERTCISA
Malware Analysis Report (AR21-048G): AppleJeus: Ants2Whale
AppleJeus AppleJeus
2021-02-04HALAimad Berady, Gilles Guette, Mathieu Jaume, Valérie Viet Triem Tong
From TTP to IoC: Advanced Persistent Graphs forThreat Hunting
2021-02-01GoSecureLilly Chalupowski
BazarLoader Mocks Researchers in December 2020 Malspam Campaign
BazarBackdoor
2021-02-01EST SecurityAlyac
Thallium organization conducts elaborate cyber attack against Russian researchers working in the North Korean economyPerforming sophisticated cyber attacks against researchers
2021-01-27laceworkChris Hall
Groundhog Botnet Rapidly Infecting Cloud
XOR DDoS
2021-01-25Trend MicroFyodor Yarochkin, Loseway Lu, Marshall Chen, Matsukawa Bakuei, Vladimir Kropotov
Fake Office 365 Used for Phishing Attacks on C-Suite Targets
2021-01-24Medium nasbenchNasreddine Bencherchali
Common Tools & Techniques Used By Threat Actors and Malware — Part I
2021-01-18ArxivDaniele Sgandurra, Jason Gray, Lorenzo Cavallaro
Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets
2021-01-03EST SecurityAlyac
Thallium organization exploits private stock investment messenger to attack software supply chain
2020-12-17EST SecurityAlyac
Thallium organization attacks domestic blockchain company with documents of non-delinquency confirmation
2020-12-14VolexityDamien Cash, Matthew Meltzer, Sean Koessel, Steven Adair, Thomas Lancaster, Volexity Threat Research
Dark Halo Leverages SolarWinds Compromise to Breach Organizations
SUNBURST
2020-12-09FireEyeMitchell Clarke, Tom Hall
It's not FINished The Evolving Maturity in Ransomware Operations (SLIDES)
Cobalt Strike DoppelPaymer QakBot REvil
2020-11-30FireEyeMitchell Clarke, Tom Hall
It's not FINished The Evolving Maturity in Ransomware Operations
Cobalt Strike DoppelPaymer MimiKatz QakBot REvil
2020-11-10laceworkChris Hall
Meet Muhstik – IoT Botnet Infecting Cloud Servers
Tsunami
2020-10-16AlyacAlyac
탈륨조직의 국내 암호화폐 지갑 펌웨어로 위장한 다차원 APT 공격 분석출처 ( THALLIUM)
2020-10-15laceworkChris Hall
Moobot's Cloud Migration
2020-10-14Palo Alto Networks Unit 42Ken Hsu, Qi Deng, Vaibhav Singhal, Yue Guan
Two New IoT Vulnerabilities Identified with Mirai Payloads
Mirai
2020-10-13Nozomi NetworksAlessandro Di Pinto
Overcoming the Challenges of Detecting P2P Botnets on Your Network
Mozi
2020-10-03Medium vishal_thakurVishal Thakur
Grinju Downloader: Anti-analysis (on steroids) | Part 2
Grinju Downloader
2020-09-22Medium (@vishal_thakur)Vishal Thakur
Grinju Downloader
Grinju Downloader