Click here to download all references as Bib-File.•
2024-10-15
⋅
⋅
Weixin
⋅
Analysis of the attack activities of APT-C-35 (belly brain worm) against a manufacturing company in South Asia Unidentified 117 (Donot Loader) |
2024-02-16
⋅
YouTube (CactusCon)
⋅
Reverse Engineering Go Malware: A BianLian Story BianLian BianLian |
2024-01-22
⋅
ShadowStackRE
⋅
Cactus Ransomware Cactus |
2023-12-01
⋅
Twitter (@MsftSecIntel)
⋅
Tweet on Danabot leading to cactus ransomware Cactus DanaBot Storm-1044 |
2022-05-10
⋅
Checkpoint
⋅
Info-stealer Campaign targets German Car Dealerships and Manufacturers Azorult BitRAT Raccoon |
2022-04-04
⋅
⋅
LAC WATCH
⋅
Confirmation of damage to domestic e-commerce sites, actual situation of Web skimming attacks and examples of countermeasures that Rack thinks (Water Pamola) FAKEUPDATES |
2022-03-16
⋅
Dragos
⋅
Suspected Conti Ransomware Activity in the Auto Manufacturing Sector Conti Emotet |
2022-01-16
⋅
forensicitguy
⋅
Analyzing a CACTUSTORCH HTA Leading to Cobalt Strike CACTUSTORCH Cobalt Strike |
2021-05-05
⋅
TRUESEC
⋅
Are The Notorious Cyber Criminals Evil Corp actually Russian Spies? Cobalt Strike Hades WastedLocker |
2021-02-21
⋅
⋅
Antiy
⋅
Analysis report on the attack activities of the "Baby Elephant" against Pakistani defense manufacturers |
2020-12-01
⋅
Trend Micro
⋅
The Impact of Modern Ransomware on Manufacturing Networks Maze Petya REvil |
2020-11-12
⋅
Dragos
⋅
Cyber Threat Perspective MANUFACTURING SECTOR Industroyer Snake |
2020-08-13
⋅
Kaspersky Labs
⋅
CactusPete APT group’s updated Bisonal backdoor Korlia Tonto Team |
2020-07-14
⋅
CrowdStrike
⋅
Manufacturing Industry in the Adversaries’ Crosshairs ShadowPad Snake |
2020-07-01
⋅
Cisco Talos
⋅
Threat Spotlight: Valak Slithers Its Way Into Manufacturing and Transportation Networks Valak IcedID ISFB MyKings Spreader |
2020-05-22
⋅
Yoroi
⋅
Cyber-Criminal espionage Operation insists on Italian Manufacturing Agent Tesla |
2020-03-02
⋅
TechCrunch
⋅
Visser, a parts manufacturer for Tesla and SpaceX, confirms data breach DoppelPaymer |
2020-01-28
⋅
⋅
Macnica Networks
⋅
Tick Group Aiming at Japanese Manufacturing Datper xxmm |
2020-01-23
⋅
Palo Alto Networks Unit 42
⋅
The Fractured Statue Campaign: U.S. Government Targeted in Spear-Phishing Attacks CARROTBALL CarrotBat Syscon |
2019-11-29
⋅
Palo Alto Networks Unit 42
⋅
The Fractured Block Campaign: CARROTBAT Used to Deliver Malware Targeting Southeast Asia CarrotBat |
2019-11-19
⋅
⋅
ACTU
⋅
Une rançon après la cyberattaque au CHU de Rouen ? Ce que réclament les pirates Clop |
2019-03-29
⋅
Vice Motherboard
⋅
Researchers Find Google Play Store Apps Were Actually Government Malware Exodus |
2017-11-16
⋅
Github (mdsecactivebreach)
⋅
CACTUSTORCH: Payload Generation for Adversary Simulations CACTUSTORCH |
2017-05-10
⋅
Cybereason
⋅
Proton.B: What this Mac malware actually does Proton RAT |
2017-04-10
⋅
Bleeping Computer
⋅
Longhorn Cyber-Espionage Group Is Actually the CIA Longhorn |
2016-06-13
⋅
⋅
Macnica Networks
⋅
Survey of the actual situation of the large-scale cyber spy activity that hit Japan | 1st edition Emdivi PlugX |