Click here to download all references as Bib-File.•
| 2022-10-07
⋅
Team Cymru
⋅
A Visualizza into Recent IcedID Campaigns: Reconstructing Threat Actor Metrics with Pure Signal™ Recon IcedID PhotoLoader |
| 2022-09-29
⋅
Symantec
⋅
Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East CHINACHOPPER Lookback MimiKatz Witchetty |
| 2022-09-29
⋅
Team Cymru
⋅
Seychelles, Seychelles, on the C(2) Shore: An overview of a bulletproof hosting provider named ELITETEAM. Amadey Raccoon RedLine Stealer SmokeLoader STOP |
| 2022-09-22
⋅
Broadcom
⋅
Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics BlackCat BlackMatter DarkSide |
| 2022-09-20
⋅
Recorded Future
⋅
Threat Actors Continue to Abuse Google Tag Manager for Payment Card e-Skimming |
| 2022-09-15
⋅
Symantec
⋅
Webworm: Espionage Attackers Testing and Using Older Modified RATs 9002 RAT Ghost RAT Trochilus RAT |
| 2022-09-13
⋅
Symantec
⋅
New Wave of Espionage Activity Targets Asian Governments MimiKatz PlugX Quasar RAT ShadowPad Trochilus RAT |
| 2022-09-05
⋅
Team Cymru
⋅
Mythic Case Study: Assessing Common Offensive Security Tools |
| 2022-08-25
⋅
Group-IB
⋅
Roasting 0ktapus: The phishing campaign going after Okta identity credentials |
| 2022-08-15
⋅
Symantec
⋅
Shuckworm: Russia-Linked Group Maintains Ukraine Focus |
| 2022-08-12
⋅
Sekoia
⋅
LuckyMouse uses a backdoored Electron app to target MacOS HyperBro |
| 2022-08-08
⋅
Medium CSIS Techblog
⋅
An inside view of domain anonymization as-a-service — the BraZZZerSFF infrastructure Riltok magecart Anubis Azorult BetaBot Buer CoalaBot CryptBot DiamondFox DreamBot GCleaner ISFB Loki Password Stealer (PWS) MedusaLocker MeguminTrojan Nemty PsiX RedLine Stealer SmokeLoader STOP TinyNuke Vidar Zloader |
| 2022-07-26
⋅
CYBER GEEKS All Things Infosec
⋅
HOW to Analyze Linux Malware - A Case Study of Symbiote Symbiote |
| 2022-07-26
⋅
Cyber Geeks
⋅
How To Analyze Linux Malware – A Case Study Of Symbiote Symbiote |
| 2022-07-20
⋅
Symantec
⋅
LockBit: Ransomware Puts Servers in the Crosshairs LockBit |
| 2022-07-12
⋅
Team Cymru
⋅
An Analysis of Infrastructure linked to the Hagga Threat Actor Hagga |
| 2022-07-12
⋅
Team Cymru
⋅
An Analysis of Infrastructure linked to the Hagga Threat Actor Agent Tesla |
| 2022-06-29
⋅
Team Cymru
⋅
The Sliding Scale of Threat Actor Sophistication When Reacting to 0-day Vulnerabilities |
| 2022-06-28
⋅
Symantec
⋅
Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem BumbleBee |
| 2022-06-09
⋅
Blackberry
⋅
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat Symbiote |