Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-04-09AhnLabAhnLab ASEC Analysis Team
@online{team:20210409:dissemination:35e59c8, author = {AhnLab ASEC Analysis Team}, title = {{Dissemination of Korean document (HWP) titled inquiries related to North Korea}}, date = {2021-04-09}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/21873/}, language = {Korean}, urldate = {2021-04-14} } Dissemination of Korean document (HWP) titled inquiries related to North Korea
2021-03-22AhnLabAhnLab ASEC Analysis Team
@online{team:20210322:external:334c7ce, author = {AhnLab ASEC Analysis Team}, title = {{대북관련 본문 내용의 External 링크를 이용한 악성 워드 문서}}, date = {2021-03-22}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/21359/}, language = {Korean}, urldate = {2021-03-25} } 대북관련 본문 내용의 External 링크를 이용한 악성 워드 문서
2021-02-03AhnLabAhnLab ASEC Analysis Team
@online{team:20210203:dissemination:de95157, author = {AhnLab ASEC Analysis Team}, title = {{Dissemination of malicious code disguised as a document of'Amendment of Ministry of Defense's Business Report in 2021}}, date = {2021-02-03}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/20057/}, language = {Korean}, urldate = {2021-02-04} } Dissemination of malicious code disguised as a document of'Amendment of Ministry of Defense's Business Report in 2021
2021-02-01AhnLabASEC Analysis Team
@online{team:20210201:bluecrab:df21c0a, author = {ASEC Analysis Team}, title = {{BlueCrab ransomware, CobaltStrike hacking tool installed in corporate environment}}, date = {2021-02-01}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/19860/}, language = {English}, urldate = {2021-02-06} } BlueCrab ransomware, CobaltStrike hacking tool installed in corporate environment
Cobalt Strike REvil
2021-01-28AhnLabASEC Analysis Team
@online{team:20210128:bluecrab:44d2e64, author = {ASEC Analysis Team}, title = {{BlueCrab ransomware constantly trying to bypass detection}}, date = {2021-01-28}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/19640/}, language = {Korean}, urldate = {2021-02-04} } BlueCrab ransomware constantly trying to bypass detection
Cobalt Strike REvil
2020-12-22AhnLabASEC Analysis Team
@online{team:20201222:magniber:cb6369b, author = {ASEC Analysis Team}, title = {{Magniber Ransomware Changed Vulnerability (CVE-2019-1367 -> CVE-2020-0968) and Attempted to Bypass Behavior Detection}}, date = {2020-12-22}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/19273/}, language = {English}, urldate = {2020-12-23} } Magniber Ransomware Changed Vulnerability (CVE-2019-1367 -> CVE-2020-0968) and Attempted to Bypass Behavior Detection
Magniber
2020-12-08AhnLabAhnLab ASEC Analysis Team
@online{team:20201208:2021:e29d0dc, author = {AhnLab ASEC Analysis Team}, title = {{“「2021 평화∙통일 이야기 공모전」 참가 신청서” 제목의 한글문서 유포 (APT 추정)}}, date = {2020-12-08}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/18796/}, language = {Korean}, urldate = {2020-12-14} } “「2021 평화∙통일 이야기 공모전」 참가 신청서” 제목의 한글문서 유포 (APT 추정)
PoorWeb
2020-07-02AhnLabAhnLab ASEC Analysis Team
@techreport{team:20200702:malicious:700e400, author = {AhnLab ASEC Analysis Team}, title = {{Malicious Hangul Word Processor Files Exploiting Ghostscript Vulnerability}}, date = {2020-07-02}, institution = {AhnLab}, url = {https://global.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.99_ENG.pdf}, language = {English}, urldate = {2020-07-02} } Malicious Hangul Word Processor Files Exploiting Ghostscript Vulnerability
2020-05-25AhnLabAhnLab ASEC Analysis Team
@online{team:20200525:hangul:d83d3b1, author = {AhnLab ASEC Analysis Team}, title = {{Hangul malware distributed in real estate investment related emails (using EPS)}}, date = {2020-05-25}, organization = {AhnLab}, url = {https://asec.ahnlab.com/1323}, language = {Korean}, urldate = {2020-05-26} } Hangul malware distributed in real estate investment related emails (using EPS)
2020-03-05AhnLabAhnLab ASEC Analysis Team
@online{team:20200305:bisonal:96d4292, author = {AhnLab ASEC Analysis Team}, title = {{신천지 비상연락처 위장한 Bisonal 악성코드 유포 중}}, date = {2020-03-05}, organization = {AhnLab}, url = {https://asec.ahnlab.com/1298}, language = {Korean}, urldate = {2020-03-09} } 신천지 비상연락처 위장한 Bisonal 악성코드 유포 중
Korlia
2019-11-21ASECASEC Analysis Team
@online{team:20191121:gandcrab:39506f0, author = {ASEC Analysis Team}, title = {{GandCrab Finds DEATHRansom of the Same Appearance Following Nemty in Korea}}, date = {2019-11-21}, organization = {ASEC}, url = {https://asec.ahnlab.com/1269}, language = {English}, urldate = {2020-01-09} } GandCrab Finds DEATHRansom of the Same Appearance Following Nemty in Korea
DeathRansom
2019-03-22AhnLabAhnLab ASEC Analysis Team
@techreport{team:20190322:asec:3a00378, author = {AhnLab ASEC Analysis Team}, title = {{ASEC REPORT VOL.93 Q4 2018}}, date = {2019-03-22}, institution = {AhnLab}, url = {https://global.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.93_ENG.pdf}, language = {English}, urldate = {2020-07-24} } ASEC REPORT VOL.93 Q4 2018
Korlia
2018-07-18ASECAhnLab ASEC Analysis Team
@online{team:20180718:gandcrab:dc09385, author = {AhnLab ASEC Analysis Team}, title = {{GandCrab v4.1.2 Encryption Blocking Method (Kill Switch)}}, date = {2018-07-18}, organization = {ASEC}, url = {http://asec.ahnlab.com/1145}, language = {Korean}, urldate = {2020-01-08} } GandCrab v4.1.2 Encryption Blocking Method (Kill Switch)
Gandcrab