Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-25JPCERT/CCHayato Sasaki
Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup
2025-03-25DomainToolsDomainTools
Phishing Campaign Targets Defense and Aerospace Firms Linked to Ukraine Conflict
2025-03-25Kaspersky LabsBoris Larin, Igor Kuznetsov
Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain
2025-03-24SYGNIASygnia Team
Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation
CHINACHOPPER reGeorg
2025-03-18TrellixJambul Tologonov, John Fokker
Analysis of Black Basta Ransomware Chat Leaks
Black Basta Black Basta
2025-03-18ExpelAARON WALTON
Code-signing certificate abuse in the Black Basta chat leaks (and how to fight back)
Black Basta Black Basta
2025-03-18WeLiveSecurityDominik Breitenbacher
Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor
Anel AsyncRAT
2025-03-17CloudflareCloudflare
Black Basta’s blunder: exploiting the gang’s leaked chats
Black Basta Black Basta
2025-03-15Github (TheRavenFile)Rakesh Krishnan
IoCs for Anubis Backdoor
Anubis Backdoor
2025-03-14Trend MicroAdam O'Connor, Ian Kenefick, Jack Walsh, Laura Medina, Lucas Silva
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware
FAKEUPDATES RansomHub
2025-03-13SecuronixDen Iyzvyk, Tim Peck
Analyzing OBSCURE#BAT Threat Actors Lure Victims into Executing Malicious Batch Scripts to Deploy Stealthy Rootkits
Quasar RAT r77
2025-03-13EclecticIQArda Büyükkaya
Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices
Black Basta
2025-03-13Cyfirmacyfirma
Tracking Ransomware: February 2025
LinkC Pub
2025-03-13Tinyhack.comtinyhack
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs
Akira
2025-03-13Group-IBGroup-IB
ClickFix: The Social Engineering Technique Hackers Use to Manipulate Victims
Emmenhtal Lumma Stealer
2025-03-13Linkedin (ThreatMon)Aziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Chrome DLL Manipulation Attack Exposed
2025-03-12Youtube (AhmedS Kasmani)AhmedS Kasmani
Initial Analysis of Black Basta Chat Leaks
Black Basta Black Basta
2025-03-12YouTube (John Hammond)John Hammond
LEAKED Russian Hackers Internal Chats
Black Basta Black Basta
2025-03-12CISACISA, FBI, MS-ISAC
Medusa Ransomware
2025-03-12MandiantFrank Tse, Jakub Jozwiak, Logeswaran Nadarajan, Lukasz Lamparski, Mathew Potaczek, Mustafa Nasser, Nick Harbour, Punsaen Boonyakarn, Shawn Chew
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers
tsh