Click here to download all references as Bib-File.•
| 2020-03-24
⋅
TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany TrickMo |
| 2020-03-24
⋅
RiskIQ
⋅
Exploring Agent Tesla Infrastructure Agent Tesla |
| 2020-03-24
⋅
RSA
⋅
Exchange Exploit Case Study – CVE-2020-0688 |
| 2020-03-24
⋅
Avira
⋅
A new technique to analyze FormBook malware infections Formbook |
| 2020-03-24
⋅
⋅
ID Ransomware
⋅
KEKW Ransomware KEKW-Locker Ransomware KEKW |
| 2020-03-24
⋅
Kaspersky Labs
⋅
WildPressure targets industrial-related entities in the Middle East Milum WildPressure |
| 2020-03-24
⋅
Kaspersky Labs
⋅
People infected with coronavirus are all around you, says Ginp Trojan Ginp |
| 2020-03-24
⋅
Bleeping Computer
⋅
Three More Ransomware Families Create Sites to Leak Stolen Data Clop DoppelPaymer Maze Nefilim Nemty REvil |
| 2020-03-24
⋅
Trend Micro
⋅
Technical Brief: Operation Poisoned News: Hong Kong Users Targeted with Mobile Malware via Local News Links dmsSpy lightSpy |
| 2020-03-24
⋅
Trend Micro
⋅
Operation Poisoned News: Hong Kong Users Targeted With Mobile Malware via Local News Links dmsSpy lightSpy |
| 2020-03-23
⋅
Malwarebytes
⋅
Fake “Corona Antivirus” distributes BlackNET remote administration tool BlackNET RAT |
| 2020-03-23
⋅
Trend Micro
⋅
Nefilim Ransomware Threatens to Expose Stolen Data Nefilim |
| 2020-03-23
⋅
Kaspersky Labs
⋅
Fin7 APT: how billion dollar crime ring remains active after leaders’ arrest Carbanak |
| 2020-03-23
⋅
360 netlab
⋅
Icnanker, a Linux Trojan-Downloader Protected by SHC Icnanker |
| 2020-03-23
⋅
Carnegie Mellon University
⋅
Snake Ransomware Analysis Updates Snake |
| 2020-03-23
⋅
SANS ISC
⋅
KPOT Deployed via AutoIt Script KPOT Stealer |
| 2020-03-23
⋅
Reuters
⋅
Exclusive: Elite hackers target WHO as coronavirus cyberattacks spike DarkHotel |
| 2020-03-23
⋅
Microsoft
⋅
Latest Astaroth living-off-the-land attacks are even more invisible but not less observable Astaroth |
| 2020-03-23
⋅
⋅
Cert-Pa
⋅
PwndLocker si rinnova in ProLock Ransomware PwndLocker |
| 2020-03-22
⋅
Anomali
⋅
COVID-19 Themes Are Being Utilized by Threat Actors of Varying Sophistication PlugX |