Click here to download all references as Bib-File.•
2019-04-23
⋅
Fortinet
⋅
FakeDefend FakeDefend |
2019-04-23
⋅
Kaspersky Labs
⋅
Operation ShadowHammer: a high-profile supply chain attack shadowhammer ShadowPad |
2019-04-23
⋅
Talos
⋅
DNSpionage brings out the Karkoff DNSpionage Karkoff DNSpionage |
2019-04-23
⋅
FireEye
⋅
CARBANAK Week Part Two: Continuing the CARBANAK Source Code Analysis |
2019-04-23
⋅
APT34: webmask project DNSpionage |
2019-04-22
⋅
Check Point
⋅
FINTEAM: Trojanized TeamViewer Against Government Targets FINTEAM |
2019-04-22
⋅
Trend Micro
⋅
C/C++ Runtime Library Code Tampering in Supply Chain shadowhammer ShadowPad Winnti |
2019-04-22
⋅
KrebsOnSecurity
⋅
Who’s Behind the RevCode WebMonitor RAT? WebMonitor RAT |
2019-04-22
⋅
SANS
⋅
Unpacking & Decrypting FlawedAmmyy FlawedAmmyy |
2019-04-22
⋅
Twitter (@killamjr)
⋅
Tweet on DADSTACHE payload DADSTACHE |
2019-04-22
⋅
int 0xcc blog
⋅
Dissecting Emotet’s network communication protocol Emotet |
2019-04-22
⋅
FireEye
⋅
CARBANAK Week Part One: A Rare Occurrence Carbanak |
2019-04-19
⋅
Cylance
⋅
OceanLotus Steganography |
2019-04-19
⋅
Medium
⋅
Hacking (Back) and Influence Operations BONDUPDATER |
2019-04-19
⋅
ZDNet
⋅
Security researcher MalwareTech pleads guilty Kronos |
2019-04-19
⋅
Github (hfiref0x)
⋅
TDL (Turla Driver Loader) Repository Cobra Carbon System |
2019-04-18
⋅
Yoroi
⋅
APT28 and Upcoming Elections: Evidence of Possible Interference (Part II) Seduploader |
2019-04-18
⋅
Fortinet
⋅
Predator the Thief: New Routes of Delivery Predator The Thief |
2019-04-17
⋅
Malware Reversing Blog
⋅
The Dukes: 7 Years Of Russian Cyber-Espionage TwoFace BONDUPDATER DNSpionage |
2019-04-17
⋅
Cisco Talos
⋅
DNS Hijacking Abuses Trust In Core Internet Service Sea Turtle |