Click here to download all references as Bib-File.•
2021-03-02
⋅
Volexity
⋅
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities CHINACHOPPER HAFNIUM |
2021-02-25
⋅
BrightTALK (FireEye)
⋅
Light in the Dark: Hunting for SUNBURST SUNBURST |
2021-02-16
⋅
FireEye
⋅
Light in the Dark: Hunting for SUNBURST SUNBURST |
2021-02-01
⋅
ESET Research
⋅
Operation NightScout: Supply‑chain attack targets online gaming in Asia Ghost RAT NoxPlayer Poison Ivy Red Dev 17 |
2021-01-26
⋅
Comae
⋅
PANDORABOX - North Koreans target security researchers ComeBacker |
2021-01-19
⋅
Mandiant
⋅
Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452 (WHITE PAPER) |
2021-01-19
⋅
FireEye
⋅
Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452 |
2021-01-06
⋅
Mimecast
⋅
How to Slam a Door on the Cutwail Botnet: Enforce DMARC Cutwail |
2020-12-25
⋅
Comae
⋅
SUNBURST & Memory Analysis SUNBURST |
2020-12-22
⋅
TRUESEC
⋅
Collaboration between FIN7 and the RYUK group, a Truesec Investigation Carbanak Cobalt Strike Ryuk |
2020-12-22
⋅
Medium mitre-attack
⋅
Identifying UNC2452-Related Techniques for ATT&CK SUNBURST TEARDROP UNC2452 |
2020-12-18
⋅
Trend Micro
⋅
Negasteal Uses Hastebin for Fileless Delivery of Crysis Ransomware Agent Tesla Dharma |
2020-12-17
⋅
Palo Alto Networks Unit 42
⋅
SUPERNOVA SolarWinds .NET Webshell Analysis SUPERNOVA BRONZE SPIRAL |
2020-12-17
⋅
Palo Alto Networks Unit 42
⋅
SUPERNOVA: SolarStorm’s Novel .NET Webshell SUPERNOVA |
2020-12-17
⋅
ESET Research
⋅
Operation SignSight: Supply‑chain attack against a certification authority in Southeast Asia SManager |
2020-12-14
⋅
Volexity
⋅
Dark Halo Leverages SolarWinds Compromise to Breach Organizations SUNBURST |
2020-12-13
⋅
FireEye
⋅
Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor SUNBURST SUPERNOVA TEARDROP UNC2452 |
2020-12-08
⋅
Red Canary
⋅
The why, what, and how of threat research |
2020-12-02
⋅
ESET Research
⋅
Turla Crutch: Keeping the “back door” open Crutch Gazer Turla |
2020-11-20
⋅
Trend Micro
⋅
Weaponizing Open Source Software for Targeted Attacks LaZagne Defray PlugX |