Click here to download all references as Bib-File.•
2020-02-07
⋅
Medium Sebdraven
⋅
APT 40 in Malaysia DADJOKE |
2020-02-07
⋅
RiskIQ
⋅
Magecart Group 12’s Latest: Actors Behind Attacks on Olympics Ticket Re-sellers Deftly Swapped Domains to Continue Campaign magecart |
2020-02-07
⋅
Binary Defense
⋅
Emotet Evolves With New Wi-Fi Spreader Emotet |
2020-02-06
⋅
DomainTools
⋅
Finding Additional Indicators With a SeaTurtle Deep Dive in Passive DNS Within DomainTools Iris Sea Turtle |
2020-02-06
⋅
Prevailion
⋅
The Triune Threat: MasterMana Returns Azorult Loki Password Stealer (PWS) |
2020-02-06
⋅
Gdata
⋅
40,000 CryptBot Downloads per Day: Bitbucket Abused as Malware Slinger CryptBot |
2020-02-06
⋅
Bleeping Computer
⋅
Ransomware Exploits GIGABYTE Driver to Kill AV Processes RobinHood |
2020-02-06
⋅
Sophos
⋅
Living off another land: Ransomware borrows vulnerable driver to remove security software RobinHood |
2020-02-06
⋅
IronNet
⋅
DNS Tunneling Series, Part 3: The Siren Song of RogueRobin RogueRobin |
2020-02-05
⋅
Bleeping Computer
⋅
Mailto (NetWalker) Ransomware Targets Enterprise Networks Mailto |
2020-02-05
⋅
FireEye
⋅
STOMP 2 DIS: Brilliance in the (Visual) Basics MINEBRIDGE |
2020-02-05
⋅
SentinelOne
⋅
Pro-Russian CyberSpy Gamaredon Intensifies Ukrainian Security Targeting Pteranodon |
2020-02-05
⋅
Cybereason
⋅
The Hole in the Bucket: Attackers Abuse Bitbucket to Deliver an Arsenal of Malware Amadey Azorult Predator The Thief STOP Vidar |
2020-02-04
⋅
Security-in-Bits
⋅
Similarity between Qealler/Pyrogenic variants -Part 0x3 Qealler |
2020-02-04
⋅
Github (onek1lo)
⋅
Borr-Stealer: Repository with decompiled code Borr |
2020-02-04
⋅
0x00sec
⋅
Analyzing Modern Malware Techniques - Part 3: A case of Powershell, Excel 4 Macros and VB6 |
2020-02-04
⋅
RevCode RAT WebMonitor RAT |
2020-02-03
⋅
SANS ISC
⋅
Analysis of a triple-encrypted AZORult downloader Azorult |
2020-02-03
⋅
Telekom
⋅
Dissecting Emotet – Part 1 Emotet |
2020-02-03
⋅
Dragos
⋅
EKANS Ransomware and ICS Operations Snake |