Click here to download all references as Bib-File.•
| 2019-04-22
            
            ⋅
            
            int 0xcc blog
            ⋅ Dissecting Emotet’s network communication protocol Emotet | 
| 2019-04-22
            
            ⋅
            
            FireEye
            ⋅ CARBANAK Week Part One: A Rare Occurrence Carbanak | 
| 2019-04-19
            
            ⋅
            
            Cylance
            ⋅ OceanLotus Steganography | 
| 2019-04-19
            
            ⋅
            
            Medium
            ⋅ Hacking (Back) and Influence Operations BONDUPDATER | 
| 2019-04-19
            
            ⋅
            
            ZDNet
            ⋅ Security researcher MalwareTech pleads guilty Kronos | 
| 2019-04-19
            
            ⋅
            
            Github (hfiref0x)
            ⋅ TDL (Turla Driver Loader) Repository Cobra Carbon System | 
| 2019-04-18
            
            ⋅
            
            Yoroi
            ⋅ APT28 and Upcoming Elections: Evidence of Possible Interference (Part II) Seduploader | 
| 2019-04-18
            
            ⋅
            
            Fortinet
            ⋅ Predator the Thief: New Routes of Delivery Predator The Thief | 
| 2019-04-17
            
            ⋅
            
            Malware Reversing Blog
            ⋅ The Dukes: 7 Years Of Russian Cyber-Espionage TwoFace BONDUPDATER DNSpionage | 
| 2019-04-17
            
            ⋅
            
            Cisco Talos
            ⋅ DNS Hijacking Abuses Trust In Core Internet Service Sea Turtle | 
| 2019-04-17
            
            ⋅
            
            Palo Alto Networks Unit 42
            ⋅ Aggah Campaign: Bit.ly, BlogSpot, and Pastebin Used for C2 in Large Scale Campaign Hagga The Gorgon Group | 
| 2019-04-17
            
            ⋅
            
            Twitter (JohnLaTwC)
            ⋅ Tweet on an unidentified VBS Backdoor Unidentified VBS 001 | 
| 2019-04-16
            
            ⋅
            
            Youtube (Norsk Hydro)
            ⋅ The cyber attack rescue operation in Hydro Toulouse LockerGoga | 
| 2019-04-16
            
            ⋅
            
            Twitter (@LukasStefanko)
            ⋅ Tweet on New Open Source Android RAT TalentRAT | 
| 2019-04-16
            
            ⋅
            
            FireEye
            ⋅ Spear Phishing Campaign Targets Ukraine Government and Military; Infrastructure Reveals Potential Link to So-Called Luhansk People's Republic Quasar RAT Vermin | 
| 2019-04-16
            
            ⋅
            
            Bitdefender
            ⋅ Inside Scranos – A Cross Platform, Rootkit-Enabled Spyware Operation Scranos | 
| 2019-04-16
            
            ⋅ DNS Tunneling in the Wild: Overview of OilRig’s DNS Tunneling BONDUPDATER QUADAGENT Alma Communicator Helminth ISMAgent | 
| 2019-04-15
            
            ⋅
            
            Talos
            ⋅ New HawkEye Reborn Variant Emerges Following Ownership Change HawkEye Keylogger | 
| 2019-04-15
            
            ⋅
            
            Twitter (@LukasStefanko)
            ⋅ Tweet on Sauron Locker Sauron Locker | 
| 2019-04-15
            
            ⋅
            
            Trend Micro
            ⋅ Account With Admin Privileges Abused to Install BitPaymer Ransomware via PsExec FriedEx |