Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-08-10AhnLabAhnLab ASEC Analysis Team
@online{team:20230810:guloader:3b02e84, author = {AhnLab ASEC Analysis Team}, title = {{GuLoader Malware Disguised as Tax Invoices and Shipping Statements (Detected by MDS Products)}}, date = {2023-08-10}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/55978/}, language = {English}, urldate = {2023-08-15} } GuLoader Malware Disguised as Tax Invoices and Shipping Statements (Detected by MDS Products)
CloudEyE
2023-05-15AhnLabAhnLab ASEC Analysis Team
@online{team:20230515:lokilocker:684344c, author = {AhnLab ASEC Analysis Team}, title = {{LokiLocker, a Ransomware Similar to BlackBit Being Distributed in Korea}}, date = {2023-05-15}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/52570/}, language = {English}, urldate = {2023-06-12} } LokiLocker, a Ransomware Similar to BlackBit Being Distributed in Korea
LokiLocker
2022-09-22AhnLabAhnLab ASEC Analysis Team
@techreport{team:20220922:analysis:9dea34b, author = {AhnLab ASEC Analysis Team}, title = {{Analysis Report on Lazarus Group's Rootkit Attack Using BYOVD}}, date = {2022-09-22}, institution = {AhnLab}, url = {https://asec.ahnlab.com/wp-content/uploads/2022/09/Analysis-Report-on-Lazarus-Groups-Rootkit-Attack-Using-BYOVD_Sep-22-2022.pdf}, language = {English}, urldate = {2022-12-29} } Analysis Report on Lazarus Group's Rootkit Attack Using BYOVD
FudModule
2022-02-21AhnLabAhnLab ASEC Analysis Team
@online{team:20220221:modified:6fd1e56, author = {AhnLab ASEC Analysis Team}, title = {{Modified CryptBot Infostealer Being Distributed}}, date = {2022-02-21}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/31802/}, language = {English}, urldate = {2023-05-02} } Modified CryptBot Infostealer Being Distributed
CryptBot
2021-07-15AhnLabAhnLab ASEC Analysis Team
@online{team:20210715:attack:f72359b, author = {AhnLab ASEC Analysis Team}, title = {{APT attack (by Kimsuky) attempt on a specific person using a word document}}, date = {2021-07-15}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/25351/}, language = {Korean}, urldate = {2021-07-20} } APT attack (by Kimsuky) attempt on a specific person using a word document
2021-07-02AhnLabAhnLab ASEC Analysis Team
@online{team:20210702:dissemination:19ccb7b, author = {AhnLab ASEC Analysis Team}, title = {{Dissemination of malicious word documents for 'Korean Political Science and Diplomacy' and 'Biography of Policy Advisor' (kimsuky)}}, date = {2021-07-02}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/24834/}, language = {Korean}, urldate = {2021-07-20} } Dissemination of malicious word documents for 'Korean Political Science and Diplomacy' and 'Biography of Policy Advisor' (kimsuky)
2021-06-04AhnLabAhnLab ASEC Analysis Team
@online{team:20210604:attacks:bf5790c, author = {AhnLab ASEC Analysis Team}, title = {{APT Attacks on Domestic Companies Using Library Files}}, date = {2021-06-04}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/23717/}, language = {English}, urldate = {2023-06-09} } APT Attacks on Domestic Companies Using Library Files
2021-05-13AhnLabAhnLab ASEC Analysis Team
@online{team:20210513:attack:1e62c17, author = {AhnLab ASEC Analysis Team}, title = {{APT attack for domestic companies using library files}}, date = {2021-05-13}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/22975/}, language = {Korean}, urldate = {2021-05-25} } APT attack for domestic companies using library files
2021-04-15AhnLabAhnLab ASEC Analysis Team
@techreport{team:20210415:operation:98f465e, author = {AhnLab ASEC Analysis Team}, title = {{Operation Dream Job Targeting Job Seekers in South Korea}}, date = {2021-04-15}, institution = {AhnLab}, url = {https://global.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.102_ENG%20(4).pdf}, language = {English}, urldate = {2021-05-25} } Operation Dream Job Targeting Job Seekers in South Korea
LCPDot Torisma
2021-04-09AhnLabAhnLab ASEC Analysis Team
@online{team:20210409:dissemination:35e59c8, author = {AhnLab ASEC Analysis Team}, title = {{Dissemination of Korean document (HWP) titled inquiries related to North Korea}}, date = {2021-04-09}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/21873/}, language = {Korean}, urldate = {2021-04-14} } Dissemination of Korean document (HWP) titled inquiries related to North Korea
2021-03-22AhnLabAhnLab ASEC Analysis Team
@online{team:20210322:external:334c7ce, author = {AhnLab ASEC Analysis Team}, title = {{대북관련 본문 내용의 External 링크를 이용한 악성 워드 문서}}, date = {2021-03-22}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/21359/}, language = {Korean}, urldate = {2021-03-25} } 대북관련 본문 내용의 External 링크를 이용한 악성 워드 문서
2021-02-03AhnLabAhnLab ASEC Analysis Team
@online{team:20210203:dissemination:de95157, author = {AhnLab ASEC Analysis Team}, title = {{Dissemination of malicious code disguised as a document of'Amendment of Ministry of Defense's Business Report in 2021}}, date = {2021-02-03}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/20057/}, language = {Korean}, urldate = {2021-02-04} } Dissemination of malicious code disguised as a document of'Amendment of Ministry of Defense's Business Report in 2021
2021-01-05AhnLabAhnLab ASEC Analysis Team
@online{team:20210105:threat:6541fd7, author = {AhnLab ASEC Analysis Team}, title = {{[Threat Analysis] CLOP Ransomware that Attacked Korean Distribution Giant}}, date = {2021-01-05}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/19542/}, language = {English}, urldate = {2021-06-16} } [Threat Analysis] CLOP Ransomware that Attacked Korean Distribution Giant
Clop
2020-12-08AhnLabAhnLab ASEC Analysis Team
@online{team:20201208:2021:e29d0dc, author = {AhnLab ASEC Analysis Team}, title = {{“「2021 평화∙통일 이야기 공모전」 참가 신청서” 제목의 한글문서 유포 (APT 추정)}}, date = {2020-12-08}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/18796/}, language = {Korean}, urldate = {2020-12-14} } “「2021 평화∙통일 이야기 공모전」 참가 신청서” 제목의 한글문서 유포 (APT 추정)
PoorWeb
2020-12-02AhnLabAhnLab ASEC Analysis Team
@techreport{team:20201202:clop:2df3556, author = {AhnLab ASEC Analysis Team}, title = {{CLOP Ransomware Report}}, date = {2020-12-02}, institution = {AhnLab}, url = {https://asec.ahnlab.com/wp-content/uploads/2021/01/Analysis_ReportCLOP_Ransomware.pdf}, language = {Korean}, urldate = {2021-07-02} } CLOP Ransomware Report
Clop
2020-07-02AhnLabAhnLab ASEC Analysis Team
@techreport{team:20200702:malicious:700e400, author = {AhnLab ASEC Analysis Team}, title = {{Malicious Hangul Word Processor Files Exploiting Ghostscript Vulnerability}}, date = {2020-07-02}, institution = {AhnLab}, url = {https://global.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.99_ENG.pdf}, language = {English}, urldate = {2020-07-02} } Malicious Hangul Word Processor Files Exploiting Ghostscript Vulnerability
2020-05-25AhnLabAhnLab ASEC Analysis Team
@online{team:20200525:hangul:d83d3b1, author = {AhnLab ASEC Analysis Team}, title = {{Hangul malware distributed in real estate investment related emails (using EPS)}}, date = {2020-05-25}, organization = {AhnLab}, url = {https://asec.ahnlab.com/1323}, language = {Korean}, urldate = {2020-05-26} } Hangul malware distributed in real estate investment related emails (using EPS)
2020-03-05AhnLabAhnLab ASEC Analysis Team
@online{team:20200305:bisonal:96d4292, author = {AhnLab ASEC Analysis Team}, title = {{신천지 비상연락처 위장한 Bisonal 악성코드 유포 중}}, date = {2020-03-05}, organization = {AhnLab}, url = {https://asec.ahnlab.com/1298}, language = {Korean}, urldate = {2020-03-09} } 신천지 비상연락처 위장한 Bisonal 악성코드 유포 중
Korlia
2019-03-22AhnLabAhnLab ASEC Analysis Team
@techreport{team:20190322:asec:3a00378, author = {AhnLab ASEC Analysis Team}, title = {{ASEC REPORT VOL.93 Q4 2018}}, date = {2019-03-22}, institution = {AhnLab}, url = {https://global.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.93_ENG.pdf}, language = {English}, urldate = {2020-07-24} } ASEC REPORT VOL.93 Q4 2018
Korlia
2018-07-18ASECAhnLab ASEC Analysis Team
@online{team:20180718:gandcrab:dc09385, author = {AhnLab ASEC Analysis Team}, title = {{GandCrab v4.1.2 Encryption Blocking Method (Kill Switch)}}, date = {2018-07-18}, organization = {ASEC}, url = {http://asec.ahnlab.com/1145}, language = {Korean}, urldate = {2020-01-08} } GandCrab v4.1.2 Encryption Blocking Method (Kill Switch)
Gandcrab