Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-04-27PRODAFT Threat IntelligencePRODAFT
Nomadic Octopus’ Paperbug Campaign
Octopus DustSquad
2023-04-26BitdefenderMartin Zugec, Victor Vrabie
Unpacking BellaCiao: A Closer Look at Iran’s Latest Malware
BellaCiao
2023-04-26UptycsUptycs Threat Research
RTM Locker Ransomware as a Service (RaaS) Now Suits Up for Linux Architecture
RTM Locker
2023-04-26United States District Court (Southern District of New York)Google
CryptBot complaint against Zubair Saeed, Raheel Arshad and Mohammad Rasheed Siddiqui
CryptBot
2023-04-26cybleCyble
Threat Actor Selling New Atomic macOS (AMOS) Stealer on Telegram
AMOS
2023-04-26Palo Alto Networks Unit 42Unit 42
Chinese Alloy Taurus Updates PingPull Malware
PingPull Sword2033
2023-04-26ESET ResearchFacundo Muñoz
Evasive Panda APT group delivers malware via updates for popular Chinese software
MgBot BRONZE HIGHLAND
2023-04-26AhnLabbghjmun
RokRAT Malware Distributed Through LNK Files (*.lnk): RedEyes (ScarCruft)
RokRAT
2023-04-26eSentireJoe Stewart, Keegan Keplinger
Gootloader Unloaded: Researchers Launch Multi-Pronged Offensive Against Gootloader, Cutting Off Traffic to Thousands of Gootloader Web Pages and Using the Operator’s Very Own Tactics to Protect End-Users
GootLoader
2023-04-24Trend MicroDon Ovid Ladores
ViperSoftX Updates Encryption, Steals Data
ViperSoftX
2023-04-24Immersive LabsKevin Breen
Detecting and decrypting Sliver C2 – a threat hunter’s guide
Sliver
2023-04-24CofenseAustin Jones
Open-Source Gh0st RAT Still Haunting Inboxes 15 Years After Release
Ghost RAT
2023-04-24Kaspersky LabsIvan Kwiatkowski, Pierre Delcher
Tomiris called, they want their Turla malware back
KopiLuwak Andromeda Ave Maria GoldMax JLORAT Kazuar Meterpreter QUIETCANARY RATel Roopy Telemiris tomiris Topinambour Storm-0473
2023-04-21K7 SecuritySudeep Waingankar
MuddyWaters back with DarkBit
DarkBit
2023-04-21SophosColin Cowie, Paul Jaramillo
IcedID: Defrosting a Recent Campaign Illustrating evolving tactics and shared infrastructure
IcedID PhotoLoader
2023-04-21SymantecThreat Hunter Team
X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe
VEILEDSIGNAL
2023-04-20ESET ResearchMarc-Etienne M.Léveillé, Peter Kálnai
Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack
BADCALL SimpleTea POOLRAT 3CX Backdoor BADCALL IconicStealer
2023-04-20Recorded FutureInsikt Group
Xiaoqiying/Genesis Day Threat Actor Group Targets South Korea, Taiwan
Xiaoqiying
2023-04-20SymantecThreat Hunter Team
Daggerfly: APT Actor Targets Telecoms Company in Africa
MgBot
2023-04-20CybleincCyble
DAAM Android Botnet being distributed through Trojanized Applications
DAAM