Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-06-29DeepInstinctDeep Instinct Threat Lab, Simon Kenin
PhonyC2: Revealing a New Malicious Command & Control Framework by MuddyWater
PhonyC2 POWERSTATS
2023-06-28BI. ZONE Cyber Threats Research TeamOleg Skulkin
Red Wolf is back to spy on commercial firms Red Wolf is back to spy on commercial firms
RedCurl
2023-06-28vmwareBria Beathley, Dana Behling, Deborah Snyder, Fae Carlisle
8Base Ransomware: A Heavy Hitting Player
8Base Phobos SmokeLoader SystemBC
2023-06-28MandiantAlexander Marvi, Greg Blaum, Ron Craft
Detection, Containment, and Hardening Opportunities for Privileged Guest Operations, Anomalous Behavior, and VMCI Backdoors on Compromised VMware Hosts
UNC3886
2023-06-28AhnLabSanseo
Kimsuky Attack Group Abusing Chrome Remote Desktop
Appleseed
2023-06-28Kaspersky LabsGReAT
Andariel’s silly mistakes and a new malware family
Jupiter
2023-06-28VolexityAnkur Saini, Charlie Gardner
Charming Kitten Updates POWERSTAR with an InterPlanetary Twist
POWERSTAR
2023-06-27ViuleeenzAlessandro Strino
IDA-Python - Locate a function independently from its offset
2023-06-26Github (cocomelonc)cocomelonc
Malware AV/VM evasion - part 18: encrypt/decrypt payload via modular multiplication-based block cipher. Simple C++ example.
2023-06-26ThreatFabricThreatFabric
Anatsa banking Trojan hits UK, US and DACH with new campaign
Anatsa
2023-06-23SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Detecting New MULTI#STORM Attack Campaign Involving Python-based Loader Masquerading as OneDrive Utilities to Drop Multiple RAT Payloads With Security Analytics
Ave Maria
2023-06-23FourcoreJones Martin
Clop Ransomware: History, Timeline, And Adversary Simulation
Clop
2023-06-23PhylumPhylum Research Team
Phylum Discovers Sophisticated Ongoing Attack on NPM
2023-06-23TrendmicroArianne Dela Cruz, Ieriz Nicolle Gonzalez, Ivan Nicole Chavez, Nathaniel Morales, Paul Pajares
An Overview of the Different Versions of the Trigona Ransomware
Trigona
2023-06-23MSSP Labcocomelonc
Malware source code investigation: Paradise Ransomware
Paradise
2023-06-23Medium (Cryptax)Axelle Apvrille
Inside KangaPack: the Kangaroo packer with native decryption
FluHorse
2023-06-22DeepInstinctDeep Instinct Threat Lab, Mark Vaitzman, Shaul Vilkomir-Preisman
PindOS: New JavaScript Dropper Delivering Bumblebee and IcedID
PindOS BumbleBee PhotoLoader
2023-06-22ANY.RUNANY.RUN
Malware Analysis Gh0stBins, Chinese RAT: Malware Analysis, Protocol Description, RDP Stream Recovery
Gh0stBins
2023-06-22Kaspersky LabsGReAT
LockBit Green and phishing that targets organizations
LockBit LockBit
2023-06-21eSentireeSentire Threat Response Unit (TRU)
Persistent Connection Established: Nitrogen Campaign Leverages DLL Side-Loading Technique for C2 Communication
Nitrogen Loader