Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-07-26FortninetFred Gutierrez, Shunichi Imano
Wiper Malware Riding the 2021 Tokyo Olympic Games
VIGILANT CLEANER
2021-07-22Trend MicroKatsuyuki Okamoto
Analysis of "[Urgent] Damage report regarding the occurrence of cyber attacks, etc. associated with the Tokyo Olympics.exe"
VIGILANT CLEANER
2021-07-22The RecordCatalin Cimpanu
Wiper malware targeting Japanese PCs discovered ahead of Tokyo Olympics opening
VIGILANT CLEANER
2021-07-21MBSDKei Sugawara, Takashi Yoshikawa
Analysis of malware (wiper) with Japanese file names related to the Tokyo Olympics
VIGILANT CLEANER
2021-07-19FBIFBI
PIN Number 20210719-001: Potential for Malicious Cyber Activities to Disrupt the 2020 Tokyo Summer Olympics
2021-07-19EllipticElliptic
REvil Revealed - Tracking a Ransomware Negotiation and Payment
REvil REvil
2021-07-15Recorded FutureInsikt Group®
Threats to the 2020 Tokyo Olympic Games
2021-07-13SymantecThreat Hunter Team
Attacks Against the Government Sector
Raindrop TEARDROP
2021-07-09The RecordCatalin Cimpanu
Ransomwhere project wants to create a database of past ransomware payments
Egregor Mailto Maze REvil
2021-07-08Team CymruAndy Kraus, Dan Heywood
Enriching Threat Intelligence for the Carbine Loader Crypto-jacking Campaign
2021-07-07TrustwaveNikita Kazymirskyi, Rodel Mendrez
Diving Deeper Into the Kaseya VSA Attack: REvil Returns and Other Hackers Are Riding Their Coattails
Cobalt Strike REvil
2021-07-03SymantecThreat Hunter Team
Kaseya Ransomware Supply Chain Attack: What You Need To Know
REvil
2021-07-02Team CymruJoshua Picolet
Transparent Tribe APT Infrastructure Mapping Part 2: A Deeper Dive into the Identification of CrimsonRAT Infrastructure
Crimson RAT
2021-06-23SymantecThreat Hunter Team
Ransomware: Growing Number of Attackers Using Virtual Machines
Mount Locker
2021-06-22CrowdStrikerich seymour
Preventing Exploitation of the ZIP File Format
2021-06-16Avast DecodedMartin Chlumecký
DirtyMoe: Introduction and General Overview of Modularized Malware
DirtyMoe
2021-05-19Team CymruAndy Kraus, Josh Hopkins, Nick Byers
Tracking BokBot Infrastructure Mapping a Vast and Currently Active BokBot Network
IcedID
2021-05-19Nozomi NetworksAlexey Kleymenov
Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works
DarkSide
2021-05-11The RecordCatalin Cimpanu
15% of 2020 ransomware payments carried a sanctions violations risk
2021-05-05SymantecThreat Hunter Team
Multi-Factor Authentication: Headache for Cyber Actors Inspires New Attack Techniques
CHINACHOPPER