Click here to download all references as Bib-File.•
2020-02-06
⋅
Gdata
⋅
40,000 CryptBot Downloads per Day: Bitbucket Abused as Malware Slinger CryptBot |
2020-02-06
⋅
Bleeping Computer
⋅
Ransomware Exploits GIGABYTE Driver to Kill AV Processes RobinHood |
2020-02-06
⋅
Sophos
⋅
Living off another land: Ransomware borrows vulnerable driver to remove security software RobinHood |
2020-02-06
⋅
IronNet
⋅
DNS Tunneling Series, Part 3: The Siren Song of RogueRobin RogueRobin |
2020-02-05
⋅
Bleeping Computer
⋅
Mailto (NetWalker) Ransomware Targets Enterprise Networks Mailto |
2020-02-05
⋅
FireEye
⋅
STOMP 2 DIS: Brilliance in the (Visual) Basics MINEBRIDGE |
2020-02-05
⋅
SentinelOne
⋅
Pro-Russian CyberSpy Gamaredon Intensifies Ukrainian Security Targeting Pteranodon |
2020-02-05
⋅
Cybereason
⋅
The Hole in the Bucket: Attackers Abuse Bitbucket to Deliver an Arsenal of Malware Amadey Azorult Predator The Thief STOP Vidar |
2020-02-04
⋅
Security-in-Bits
⋅
Similarity between Qealler/Pyrogenic variants -Part 0x3 Qealler |
2020-02-04
⋅
⋅
ID Ransomware
⋅
RagnarLocker Ransomware RagnarLocker |
2020-02-04
⋅
Github (onek1lo)
⋅
Borr-Stealer: Repository with decompiled code Borr |
2020-02-04
⋅
Borr Malware Borr |
2020-02-04
⋅
0x00sec
⋅
Analyzing Modern Malware Techniques - Part 3: A case of Powershell, Excel 4 Macros and VB6 |
2020-02-04
⋅
RevCode RAT WebMonitor RAT |
2020-02-03
⋅
SANS ISC
⋅
Analysis of a triple-encrypted AZORult downloader Azorult |
2020-02-03
⋅
⋅
ID Ransomware
⋅
PassLock Ransomware Passlock |
2020-02-03
⋅
Telekom
⋅
Dissecting Emotet – Part 1 Emotet |
2020-02-03
⋅
Dragos
⋅
EKANS Ransomware and ICS Operations Snake |
2020-02-03
⋅
Check Point Research
⋅
Warzone: Behind the enemy lines Ave Maria |
2020-02-02
⋅
ESET Research
⋅
TLP: WHITE A WILD KOBALOS APPEARSTricksy Linux malware goes after HPCs Kobalos |