Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-09-02ASECAhnLab ASEC Analysis Team
@online{team:20210902:attacks:39695ea, author = {AhnLab ASEC Analysis Team}, title = {{Attacks using metasploit meterpreter}}, date = {2021-09-02}, organization = {ASEC}, url = {https://asec.ahnlab.com/ko/26705/}, language = {Korean}, urldate = {2021-09-09} } Attacks using metasploit meterpreter
Appleseed Meterpreter
2021-07-15AhnLabAhnLab ASEC Analysis Team
@online{team:20210715:attack:f72359b, author = {AhnLab ASEC Analysis Team}, title = {{APT attack (by Kimsuky) attempt on a specific person using a word document}}, date = {2021-07-15}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/25351/}, language = {Korean}, urldate = {2021-07-20} } APT attack (by Kimsuky) attempt on a specific person using a word document
2021-07-02AhnLabAhnLab ASEC Analysis Team
@online{team:20210702:dissemination:19ccb7b, author = {AhnLab ASEC Analysis Team}, title = {{Dissemination of malicious word documents for 'Korean Political Science and Diplomacy' and 'Biography of Policy Advisor' (kimsuky)}}, date = {2021-07-02}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/24834/}, language = {Korean}, urldate = {2021-07-20} } Dissemination of malicious word documents for 'Korean Political Science and Diplomacy' and 'Biography of Policy Advisor' (kimsuky)
2021-05-24AhnLabAhnLab ASEC Analysis Team
@online{team:20210524:vidar:ea3dec5, author = {AhnLab ASEC Analysis Team}, title = {{Vidar Info-Stealer Abusing Game Platform}}, date = {2021-05-24}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/22932/}, language = {English}, urldate = {2021-06-16} } Vidar Info-Stealer Abusing Game Platform
vidar
2021-05-13AhnLabAhnLab ASEC Analysis Team
@online{team:20210513:attack:1e62c17, author = {AhnLab ASEC Analysis Team}, title = {{APT attack for domestic companies using library files}}, date = {2021-05-13}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/22975/}, language = {Korean}, urldate = {2021-05-25} } APT attack for domestic companies using library files
2021-04-15AhnLabAhnLab ASEC Analysis Team
@techreport{team:20210415:operation:98f465e, author = {AhnLab ASEC Analysis Team}, title = {{Operation Dream Job Targeting Job Seekers in South Korea}}, date = {2021-04-15}, institution = {AhnLab}, url = {https://global.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.102_ENG%20(4).pdf}, language = {English}, urldate = {2021-05-25} } Operation Dream Job Targeting Job Seekers in South Korea
LCPDot Torisma
2021-04-09AhnLabAhnLab ASEC Analysis Team
@online{team:20210409:dissemination:35e59c8, author = {AhnLab ASEC Analysis Team}, title = {{Dissemination of Korean document (HWP) titled inquiries related to North Korea}}, date = {2021-04-09}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/21873/}, language = {Korean}, urldate = {2021-04-14} } Dissemination of Korean document (HWP) titled inquiries related to North Korea
2021-03-22AhnLabAhnLab ASEC Analysis Team
@online{team:20210322:external:334c7ce, author = {AhnLab ASEC Analysis Team}, title = {{대북관련 본문 내용의 External 링크를 이용한 악성 워드 문서}}, date = {2021-03-22}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/21359/}, language = {Korean}, urldate = {2021-03-25} } 대북관련 본문 내용의 External 링크를 이용한 악성 워드 문서
2021-02-03AhnLabAhnLab ASEC Analysis Team
@online{team:20210203:dissemination:de95157, author = {AhnLab ASEC Analysis Team}, title = {{Dissemination of malicious code disguised as a document of'Amendment of Ministry of Defense's Business Report in 2021}}, date = {2021-02-03}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/20057/}, language = {Korean}, urldate = {2021-02-04} } Dissemination of malicious code disguised as a document of'Amendment of Ministry of Defense's Business Report in 2021
2021-02-01AhnLabASEC Analysis Team
@online{team:20210201:bluecrab:df21c0a, author = {ASEC Analysis Team}, title = {{BlueCrab ransomware, CobaltStrike hacking tool installed in corporate environment}}, date = {2021-02-01}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/19860/}, language = {English}, urldate = {2021-02-06} } BlueCrab ransomware, CobaltStrike hacking tool installed in corporate environment
Cobalt Strike REvil
2021-01-28AhnLabASEC Analysis Team
@online{team:20210128:bluecrab:44d2e64, author = {ASEC Analysis Team}, title = {{BlueCrab ransomware constantly trying to bypass detection}}, date = {2021-01-28}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/19640/}, language = {Korean}, urldate = {2021-02-04} } BlueCrab ransomware constantly trying to bypass detection
Cobalt Strike REvil
2021-01-05AhnLabAhnLab ASEC Analysis Team
@online{team:20210105:threat:6541fd7, author = {AhnLab ASEC Analysis Team}, title = {{[Threat Analysis] CLOP Ransomware that Attacked Korean Distribution Giant}}, date = {2021-01-05}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/19542/}, language = {English}, urldate = {2021-06-16} } [Threat Analysis] CLOP Ransomware that Attacked Korean Distribution Giant
Clop
2020-12-22AhnLabASEC Analysis Team
@online{team:20201222:magniber:cb6369b, author = {ASEC Analysis Team}, title = {{Magniber Ransomware Changed Vulnerability (CVE-2019-1367 -> CVE-2020-0968) and Attempted to Bypass Behavior Detection}}, date = {2020-12-22}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/19273/}, language = {English}, urldate = {2020-12-23} } Magniber Ransomware Changed Vulnerability (CVE-2019-1367 -> CVE-2020-0968) and Attempted to Bypass Behavior Detection
Magniber
2020-12-08AhnLabAhnLab ASEC Analysis Team
@online{team:20201208:2021:e29d0dc, author = {AhnLab ASEC Analysis Team}, title = {{“「2021 평화∙통일 이야기 공모전」 참가 신청서” 제목의 한글문서 유포 (APT 추정)}}, date = {2020-12-08}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/18796/}, language = {Korean}, urldate = {2020-12-14} } “「2021 평화∙통일 이야기 공모전」 참가 신청서” 제목의 한글문서 유포 (APT 추정)
PoorWeb
2020-12-02AhnLabAhnLab ASEC Analysis Team
@techreport{team:20201202:clop:2df3556, author = {AhnLab ASEC Analysis Team}, title = {{CLOP Ransomware Report}}, date = {2020-12-02}, institution = {AhnLab}, url = {https://asec.ahnlab.com/wp-content/uploads/2021/01/Analysis_ReportCLOP_Ransomware.pdf}, language = {Korean}, urldate = {2021-07-02} } CLOP Ransomware Report
Clop
2020-07-02AhnLabAhnLab ASEC Analysis Team
@techreport{team:20200702:malicious:700e400, author = {AhnLab ASEC Analysis Team}, title = {{Malicious Hangul Word Processor Files Exploiting Ghostscript Vulnerability}}, date = {2020-07-02}, institution = {AhnLab}, url = {https://global.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.99_ENG.pdf}, language = {English}, urldate = {2020-07-02} } Malicious Hangul Word Processor Files Exploiting Ghostscript Vulnerability
2020-05-25AhnLabAhnLab ASEC Analysis Team
@online{team:20200525:hangul:d83d3b1, author = {AhnLab ASEC Analysis Team}, title = {{Hangul malware distributed in real estate investment related emails (using EPS)}}, date = {2020-05-25}, organization = {AhnLab}, url = {https://asec.ahnlab.com/1323}, language = {Korean}, urldate = {2020-05-26} } Hangul malware distributed in real estate investment related emails (using EPS)
2020-03-05AhnLabAhnLab ASEC Analysis Team
@online{team:20200305:bisonal:96d4292, author = {AhnLab ASEC Analysis Team}, title = {{신천지 비상연락처 위장한 Bisonal 악성코드 유포 중}}, date = {2020-03-05}, organization = {AhnLab}, url = {https://asec.ahnlab.com/1298}, language = {Korean}, urldate = {2020-03-09} } 신천지 비상연락처 위장한 Bisonal 악성코드 유포 중
Korlia
2019-11-21ASECASEC Analysis Team
@online{team:20191121:gandcrab:39506f0, author = {ASEC Analysis Team}, title = {{GandCrab Finds DEATHRansom of the Same Appearance Following Nemty in Korea}}, date = {2019-11-21}, organization = {ASEC}, url = {https://asec.ahnlab.com/1269}, language = {English}, urldate = {2020-01-09} } GandCrab Finds DEATHRansom of the Same Appearance Following Nemty in Korea
DeathRansom
2019-03-22AhnLabAhnLab ASEC Analysis Team
@techreport{team:20190322:asec:3a00378, author = {AhnLab ASEC Analysis Team}, title = {{ASEC REPORT VOL.93 Q4 2018}}, date = {2019-03-22}, institution = {AhnLab}, url = {https://global.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.93_ENG.pdf}, language = {English}, urldate = {2020-07-24} } ASEC REPORT VOL.93 Q4 2018
Korlia