Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-06-28AhnLabASEC
@online{asec:20220628:new:df3f9bf, author = {ASEC}, title = {{New Info-stealer Disguised as Crack Being Distributed}}, date = {2022-06-28}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/35981/}, language = {English}, urldate = {2022-06-30} } New Info-stealer Disguised as Crack Being Distributed
ClipBanker CryptBot Raccoon RedLine Stealer
2022-06-24AhnLabASEC
@online{asec:20220624:lockbit:a98a9bb, author = {ASEC}, title = {{LockBit Ransomware Disguised as Copyright Claim E-mail Being Distributed}}, date = {2022-06-24}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/35822/}, language = {English}, urldate = {2022-06-27} } LockBit Ransomware Disguised as Copyright Claim E-mail Being Distributed
LockBit
2022-05-20AhnLabASEC
@online{asec:20220520:why:c6efba7, author = {ASEC}, title = {{Why Remediation Alone Is Not Enough When Infected by Malware}}, date = {2022-05-20}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/34549/}, language = {English}, urldate = {2022-05-24} } Why Remediation Alone Is Not Enough When Infected by Malware
Cobalt Strike DarkSide
2022-05-03AhnLabASEC
@online{asec:20220503:backdoors:43e357a, author = {ASEC}, title = {{Backdoors disguised as document editing and messenger programs (*.chm)}}, date = {2022-05-03}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/33948/}, language = {Korean}, urldate = {2022-05-05} } Backdoors disguised as document editing and messenger programs (*.chm)
2022-04-18ASECASEC Analysis Team
@online{team:20220418:new:4825c0e, author = {ASEC Analysis Team}, title = {{A new type of malware from the Lazarus attack group that exploits the INITECH process.}}, date = {2022-04-18}, organization = {ASEC}, url = {https://asec.ahnlab.com/ko/33706/}, language = {Korean}, urldate = {2022-04-20} } A new type of malware from the Lazarus attack group that exploits the INITECH process.
2022-04-12AhnLabASEC Analysis Team
@online{team:20220412:systembc:7bdd20c, author = {ASEC Analysis Team}, title = {{SystemBC Being Used by Various Attackers}}, date = {2022-04-12}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/33600/}, language = {English}, urldate = {2022-04-15} } SystemBC Being Used by Various Attackers
Emotet SmokeLoader SystemBC
2022-04-05AhnLabASEC Analysis Team
@online{team:20220405:malicious:ecf993a, author = {ASEC Analysis Team}, title = {{Malicious Word Documents Using MS Media Player (Impersonating AhnLab)}}, date = {2022-04-05}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/33477/}, language = {English}, urldate = {2022-04-15} } Malicious Word Documents Using MS Media Player (Impersonating AhnLab)
2022-03-31LunasecFree Wortley, Chris Thompson, Forrest Allison
@online{wortley:20220331:spring4shell:5a88abc, author = {Free Wortley and Chris Thompson and Forrest Allison}, title = {{Spring4Shell: Security Analysis of the latest Java RCE '0-day' vulnerabilities in Spring}}, date = {2022-03-31}, organization = {Lunasec}, url = {https://www.lunasec.io/docs/blog/spring-rce-vulnerabilities/}, language = {English}, urldate = {2022-04-07} } Spring4Shell: Security Analysis of the latest Java RCE '0-day' vulnerabilities in Spring
2022-03-30ASECASEC Analysis Team
@online{team:20220330:malicious:3b01394, author = {ASEC Analysis Team}, title = {{Malicious Word File Targeting Corporate Users Being Distributed}}, date = {2022-03-30}, organization = {ASEC}, url = {https://asec.ahnlab.com/en/33186/}, language = {English}, urldate = {2022-03-31} } Malicious Word File Targeting Corporate Users Being Distributed
2022-03-29AquasecAssaf Morag
@online{morag:20220329:threat:e86f441, author = {Assaf Morag}, title = {{Threat Alert: First Python Ransomware Attack Targeting Jupyter Notebooks}}, date = {2022-03-29}, organization = {Aquasec}, url = {https://blog.aquasec.com/python-ransomware-jupyter-notebook}, language = {English}, urldate = {2022-04-05} } Threat Alert: First Python Ransomware Attack Targeting Jupyter Notebooks
2022-03-29ASECASEC Analysis Team
@online{team:20220329:attack:9e20edd, author = {ASEC Analysis Team}, title = {{APT Attack Impersonating Defector Resume Form (VBS SCRIPT)}}, date = {2022-03-29}, organization = {ASEC}, url = {https://asec.ahnlab.com/ko/33141/}, language = {Korean}, urldate = {2022-03-31} } APT Attack Impersonating Defector Resume Form (VBS SCRIPT)
2022-03-28ASECASEC
@online{asec:20220328:vbs:9f536ea, author = {ASEC}, title = {{VBS Script Disguised as PDF File Being Distributed (Kimsuky)}}, date = {2022-03-28}, organization = {ASEC}, url = {https://asec.ahnlab.com/en/33032/}, language = {English}, urldate = {2022-03-30} } VBS Script Disguised as PDF File Being Distributed (Kimsuky)
2022-03-21AhnLabASEC Analysis Team
@online{team:20220321:bitrat:865b183, author = {ASEC Analysis Team}, title = {{BitRAT Disguised as Windows Product Key Verification Tool Being Distributed}}, date = {2022-03-21}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/32781/}, language = {English}, urldate = {2022-04-14} } BitRAT Disguised as Windows Product Key Verification Tool Being Distributed
BitRAT TinyNuke
2022-03-16AhnLabASEC Analysis Team
@online{team:20220316:gh0stcringe:65e2d3e, author = {ASEC Analysis Team}, title = {{Gh0stCringe RAT Being Distributed to Vulnerable Database Servers}}, date = {2022-03-16}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/32572/}, language = {English}, urldate = {2022-04-14} } Gh0stCringe RAT Being Distributed to Vulnerable Database Servers
Ghost RAT Kingminer
2022-03-07ASECASEC
@online{asec:20220307:distribution:d298aca, author = {ASEC}, title = {{Distribution of Remcos RAT Disguised as Tax Invoice}}, date = {2022-03-07}, organization = {ASEC}, url = {https://asec.ahnlab.com/en/32376/}, language = {English}, urldate = {2022-03-07} } Distribution of Remcos RAT Disguised as Tax Invoice
Remcos
2022-03-03ASECASEC
@online{asec:20220303:dissemination:e2ce2f4, author = {ASEC}, title = {{Dissemination of malicious korean documents masquering as press releases for the 20th presidential election}}, date = {2022-03-03}, organization = {ASEC}, url = {https://asec.ahnlab.com/ko/32330/}, language = {Korean}, urldate = {2022-03-04} } Dissemination of malicious korean documents masquering as press releases for the 20th presidential election
2022-02-28AhnLabASEC Analysis Team
@online{team:20220228:change:c9b5e5c, author = {ASEC Analysis Team}, title = {{Change in Distribution Method of Malware Disguised as Estimate (VBS Script)}}, date = {2022-02-28}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/32149/}, language = {English}, urldate = {2022-03-02} } Change in Distribution Method of Malware Disguised as Estimate (VBS Script)
Formbook
2022-02-28AhnLabASEC Analysis Team
@online{team:20220228:coinminer:32d7604, author = {ASEC Analysis Team}, title = {{CoinMiner Being Distributed to Vulnerable MS-SQL Servers}}, date = {2022-02-28}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/32143/}, language = {English}, urldate = {2022-03-02} } CoinMiner Being Distributed to Vulnerable MS-SQL Servers
2022-02-28ASECASEC
@online{asec:20220228:remcos:d53c470, author = {ASEC}, title = {{Remcos RAT malware disseminated by pretending to be tax invoices}}, date = {2022-02-28}, organization = {ASEC}, url = {https://asec.ahnlab.com/ko/32101/}, language = {Korean}, urldate = {2022-03-07} } Remcos RAT malware disseminated by pretending to be tax invoices
Remcos
2022-02-25AhnLabASEC Analysis Team
@online{team:20220225:new:828e765, author = {ASEC Analysis Team}, title = {{New Infostealer ‘ColdStealer’ Being Distributed}}, date = {2022-02-25}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/32090/}, language = {English}, urldate = {2022-03-02} } New Infostealer ‘ColdStealer’ Being Distributed
ColdStealer