Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-12-28CrowdStrikeTimo Kreuzer, Yarden Shafir, satoshi tanda, Blair Foster
@online{kreuzer:20211228:crowdstrike:32ba306, author = {Timo Kreuzer and Yarden Shafir and satoshi tanda and Blair Foster}, title = {{CrowdStrike Strengthens Exploit Protection Using Intel CPU Telemetry}}, date = {2021-12-28}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/introducing-falcon-hardware-enhanced-exploit-detection/}, language = {English}, urldate = {2022-01-03} } CrowdStrike Strengthens Exploit Protection Using Intel CPU Telemetry
2021-06-21Stratosphere LabKamila Babayeva, Sebastian García
@online{babayeva:20210621:dissecting:98ec148, author = {Kamila Babayeva and Sebastian García}, title = {{Dissecting a RAT. Analysis of the Saefko RAT.}}, date = {2021-06-21}, organization = {Stratosphere Lab}, url = {https://www.stratosphereips.org/blog/2021/6/2/dissecting-a-rat-analysis-of-the-saefko-rat}, language = {English}, urldate = {2021-06-22} } Dissecting a RAT. Analysis of the Saefko RAT.
2021-06-07ATOSLoïc Castel
@online{castel:20210607:avaddon:9a4a8cb, author = {Loïc Castel}, title = {{Avaddon Ransomware Analysis}}, date = {2021-06-07}, organization = {ATOS}, url = {https://atos.net/en/lp/securitydive/avaddon-ransomware-analysis}, language = {English}, urldate = {2021-11-17} } Avaddon Ransomware Analysis
Avaddon
2021-06-01Stratosphere LabKamila Babayeva, Sebastian García
@online{babayeva:20210601:dissecting:edf6609, author = {Kamila Babayeva and Sebastian García}, title = {{Dissecting a RAT. Analysis of the Command-line AndroRAT.}}, date = {2021-06-01}, organization = {Stratosphere Lab}, url = {https://www.stratosphereips.org/blog/2021/5/6/dissecting-a-rat-analysis-of-the-command-line-androrat}, language = {English}, urldate = {2021-06-09} } Dissecting a RAT. Analysis of the Command-line AndroRAT.
AndroRAT
2021-05-10Stratosphere LabKamila Babayeva, Sebastian García
@online{babayeva:20210510:dissecting:7ea0641, author = {Kamila Babayeva and Sebastian García}, title = {{Dissecting a RAT. Analysis of the HawkShaw.}}, date = {2021-05-10}, organization = {Stratosphere Lab}, url = {https://www.stratosphereips.org/blog/2021/5/6/dissecting-a-rat-analysis-of-the-hawkshaw}, language = {English}, urldate = {2021-05-12} } Dissecting a RAT. Analysis of the HawkShaw.
HawkShaw
2021-03-31Stratosphere LabSebastian García, Kamila Babayeva
@online{garca:20210331:dissecting:dd2cdc3, author = {Sebastian García and Kamila Babayeva}, title = {{Dissecting a RAT. Analysis of the AndroRAT}}, date = {2021-03-31}, organization = {Stratosphere Lab}, url = {https://www.stratosphereips.org/blog/2021/3/29/dissecting-a-rat-analysis-of-the-androrat}, language = {English}, urldate = {2021-03-31} } Dissecting a RAT. Analysis of the AndroRAT
AndroRAT
2021-02-03Stratosphere LabKamila Babayeva, Sebastian García
@online{babayeva:20210203:dissecting:c116828, author = {Kamila Babayeva and Sebastian García}, title = {{Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.}}, date = {2021-02-03}, organization = {Stratosphere Lab}, url = {https://www.stratosphereips.org/blog/2021/1/22/analysis-of-droidjack-v44-rat-network-traffic}, language = {English}, urldate = {2021-02-04} } Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.
DroidJack
2020-12-04Stratosphere LaboratoryLisandro Ubiedo, Thomas O'Hara, María José Erquiaga, Sebastian García, Veronica Valeros
@techreport{ubiedo:20201204:current:d056a68, author = {Lisandro Ubiedo and Thomas O'Hara and María José Erquiaga and Sebastian García and Veronica Valeros}, title = {{Current State of IPv6 Security in IoT}}, date = {2020-12-04}, institution = {Stratosphere Laboratory}, url = {https://static1.squarespace.com/static/5a01100f692ebe0459a1859f/t/5fa2ba52a81b683350465a2f/1604500058182/White_Paper__Current_State_of_IPv6_Security_in_IoT.pdf}, language = {English}, urldate = {2020-12-14} } Current State of IPv6 Security in IoT
2020-11-18Stratosphere LabStratosphere Labs
@online{labs:20201118:android:2ab0b44, author = {Stratosphere Labs}, title = {{Android Mischief Dataset}}, date = {2020-11-18}, organization = {Stratosphere Lab}, url = {https://www.stratosphereips.org/blog/2020/11/10/android-mischief-rats-dataset}, language = {English}, urldate = {2020-11-23} } Android Mischief Dataset
AhMyth AndroRAT SpyMax
2020-06-08Stratosphere LabTwitter (@_lubiedo)
@online{lubiedo:20200608:dark:6e9abe3, author = {Twitter (@_lubiedo)}, title = {{Dark Nexus: the old, the new and the ugly}}, date = {2020-06-08}, organization = {Stratosphere Lab}, url = {https://www.stratosphereips.org/blog/2020/6/8/dark-nexus-the-old-the-new-and-the-ugly}, language = {English}, urldate = {2020-06-10} } Dark Nexus: the old, the new and the ugly
Dark Nexus
2020-05-17CrowdStrikesatoshi tanda
@online{tanda:20200517:crowdstrike:f11de61, author = {satoshi tanda}, title = {{CrowdStrike Falcon Detects Kernel Attacks Exploiting Vulnerable Dell Driver (CVE-2021-21551)}}, date = {2020-05-17}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/crowdstrike-falcon-detects-dell-driver-vulnerability-cve-2021-21551/}, language = {English}, urldate = {2021-06-09} } CrowdStrike Falcon Detects Kernel Attacks Exploiting Vulnerable Dell Driver (CVE-2021-21551)
2019-08-24Persianov on SecuritySveatoslav Persianov
@online{persianov:20190824:windows:82a4a68, author = {Sveatoslav Persianov}, title = {{Windows worms. Forbix worm analysis}}, date = {2019-08-24}, organization = {Persianov on Security}, url = {https://persianov.net/windows-worms-forbix-worm-analysis}, language = {English}, urldate = {2020-01-07} } Windows worms. Forbix worm analysis
forbiks
2019-04-12Stratosphere LabMaría José Erquiaga
@online{erquiaga:20190412:analysis:bb76a6f, author = {María José Erquiaga}, title = {{Analysis of an IRC based Botnet}}, date = {2019-04-12}, organization = {Stratosphere Lab}, url = {https://www.stratosphereips.org/blog/2019/4/12/analysis-of-a-irc-based-botnet}, language = {English}, urldate = {2020-01-10} } Analysis of an IRC based Botnet
Mirai
2019-04-07Sveatoslav Persianov
@online{persianov:20190407:emotet:0aeaa67, author = {Sveatoslav Persianov}, title = {{Emotet malware analysis. Part 2}}, date = {2019-04-07}, url = {https://persianov.net/emotet-malware-analysis-part-2}, language = {English}, urldate = {2020-01-05} } Emotet malware analysis. Part 2
Emotet
2019-03-17Persianov on SecuritySveatoslav Persianov
@online{persianov:20190317:emotet:ee3ed0b, author = {Sveatoslav Persianov}, title = {{Emotet malware analysis. Part 1}}, date = {2019-03-17}, organization = {Persianov on Security}, url = {https://persianov.net/emotet-malware-analysis-part-1}, language = {English}, urldate = {2019-12-17} } Emotet malware analysis. Part 1
Emotet
2018-06-26Bleeping ComputerLawrence Abrams
@online{abrams:20180626:thanatos:bbe20fc, author = {Lawrence Abrams}, title = {{Thanatos Ransomware Decryptor Released by the Cisco Talos Group}}, date = {2018-06-26}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/thanatos-ransomware-decryptor-released-by-the-cisco-talos-group/}, language = {English}, urldate = {2019-12-20} } Thanatos Ransomware Decryptor Released by the Cisco Talos Group
Thanatos Ransomware
2018-06-26Cisco TalosEdmund Brumaghin, Earl Carter, Andrew Williams
@online{brumaghin:20180626:files:661b639, author = {Edmund Brumaghin and Earl Carter and Andrew Williams}, title = {{Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor}}, date = {2018-06-26}, organization = {Cisco Talos}, url = {https://blog.talosintelligence.com/2018/06/ThanatosDecryptor.html}, language = {English}, urldate = {2020-01-09} } Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor
Thanatos Ransomware
2018-02-26Bleeping ComputerLawrence Abrams
@online{abrams:20180226:thanatos:546a986, author = {Lawrence Abrams}, title = {{Thanatos Ransomware Is First to Use Bitcoin Cash. Messes Up Encryption}}, date = {2018-02-26}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/thanatos-ransomware-is-first-to-use-bitcoin-cash-messes-up-encryption/}, language = {English}, urldate = {2019-12-20} } Thanatos Ransomware Is First to Use Bitcoin Cash. Messes Up Encryption
Thanatos Ransomware
2018-02-15MBSDTakashi Yoshikawa, Satoshi Sugawara
@online{yoshikawa:20180215:olympic:a36f959, author = {Takashi Yoshikawa and Satoshi Sugawara}, title = {{Olympic Destroyer}}, date = {2018-02-15}, organization = {MBSD}, url = {https://www.mbsd.jp/blog/20180215.html}, language = {Japanese}, urldate = {2019-12-10} } Olympic Destroyer
Olympic Destroyer
2016-03-10ProofpointProofpoint Staff
@online{staff:20160310:death:ac16504, author = {Proofpoint Staff}, title = {{Death Comes Calling: Thanatos/Alphabot Trojan Hits the Market}}, date = {2016-03-10}, organization = {Proofpoint}, url = {https://www.proofpoint.com//us/threat-insight/post/Death-Comes-Calling-Thanatos-Alphabot-Trojan-Hits-Market}, language = {English}, urldate = {2019-12-20} } Death Comes Calling: Thanatos/Alphabot Trojan Hits the Market
Thanatos