Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-10-14CloudsekAnandeshwar Unnikrishnan, Aastha Mittal
@online{unnikrishnan:20221014:technical:6faf782, author = {Anandeshwar Unnikrishnan and Aastha Mittal}, title = {{Technical Analysis of BlueSky Ransomware}}, date = {2022-10-14}, organization = {Cloudsek}, url = {https://cloudsek.com/technical-analysis-of-bluesky-ransomware/}, language = {English}, urldate = {2022-10-24} } Technical Analysis of BlueSky Ransomware
BlueSky
2022-09-30CloudsekAnandeshwar Unnikrishnan
@online{unnikrishnan:20220930:technical:a372efd, author = {Anandeshwar Unnikrishnan}, title = {{Technical Analysis of MedusaLocker Ransomware}}, date = {2022-09-30}, organization = {Cloudsek}, url = {https://cloudsek.com/technical-analysis-of-medusalocker-ransomware/}, language = {English}, urldate = {2022-10-24} } Technical Analysis of MedusaLocker Ransomware
MedusaLocker
2022-09-16CloudsekAnandeshwar Unnikrishnan
@online{unnikrishnan:20220916:recordbreaker:8c2d4b5, author = {Anandeshwar Unnikrishnan}, title = {{Recordbreaker: The Resurgence of Raccoon}}, date = {2022-09-16}, organization = {Cloudsek}, url = {https://cloudsek.com/recordbreaker-the-resurgence-of-raccoon}, language = {English}, urldate = {2022-10-24} } Recordbreaker: The Resurgence of Raccoon
Raccoon RecordBreaker
2022-08-04CloudsekAnandeshwar Unnikrishnan, Aastha Mittal
@online{unnikrishnan:20220804:technical:f03f8fa, author = {Anandeshwar Unnikrishnan and Aastha Mittal}, title = {{Technical Analysis of Bumblebee Malware Loader}}, date = {2022-08-04}, organization = {Cloudsek}, url = {https://cloudsek.com/technical-analysis-of-bumblebee-malware-loader/}, language = {English}, urldate = {2022-10-24} } Technical Analysis of Bumblebee Malware Loader
BumbleBee
2022-05-12CloudsekAnandeshwar Unnikrishnan
@online{unnikrishnan:20220512:technical:87d0cbd, author = {Anandeshwar Unnikrishnan}, title = {{Technical Analysis of Emerging, Sophisticated Pandora Ransomware Group}}, date = {2022-05-12}, organization = {Cloudsek}, url = {https://cloudsek.com/technical-analysis-of-emerging-sophisticated-pandora-ransomware-group/}, language = {English}, urldate = {2022-05-17} } Technical Analysis of Emerging, Sophisticated Pandora Ransomware Group
Pandora
2022-03-28CloudsekAnandeshwar Unnikrishnan, Gursehaj Singh
@online{unnikrishnan:20220328:malicious:7d1f3bc, author = {Anandeshwar Unnikrishnan and Gursehaj Singh}, title = {{Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass}}, date = {2022-03-28}, organization = {Cloudsek}, url = {https://cloudsek.com/malicious-macros-and-zone-identifier-alternate-data-stream-information-bypass/}, language = {English}, urldate = {2022-05-25} } Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass
2022-03-03CloudsekAnandeshwar Unnikrishnan, Deepanjli Paulraj
@online{unnikrishnan:20220303:technical:db998ee, author = {Anandeshwar Unnikrishnan and Deepanjli Paulraj}, title = {{Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine}}, date = {2022-03-03}, organization = {Cloudsek}, url = {https://cloudsek.com/technical-analysis-of-the-hermetic-wiper-malware-used-to-target-ukraine/}, language = {English}, urldate = {2022-03-14} } Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine
HermeticWiper
2022-02-17CloudsekAnandeshwar Unnikrishnan, Hansika Saxena
@online{unnikrishnan:20220217:technical:54f175d, author = {Anandeshwar Unnikrishnan and Hansika Saxena}, title = {{Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2)}}, date = {2022-02-17}, organization = {Cloudsek}, url = {https://cloudsek.com/technical-analysis-of-code-signed-blister-malware-campaign-part-2/}, language = {English}, urldate = {2022-05-25} } Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2)
Blister
2022-01-07CloudsekAnandeshwar Unnikrishnan, Deepanjli Paulraj
@online{unnikrishnan:20220107:technical:f17b752, author = {Anandeshwar Unnikrishnan and Deepanjli Paulraj}, title = {{Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1)}}, date = {2022-01-07}, organization = {Cloudsek}, url = {https://cloudsek.com/technical-analysis-of-code-signed-blister-malware-campaign-part-1/}, language = {English}, urldate = {2022-05-25} } Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1)
Blister
2021-12-30CloudsekAnandeshwar Unnikrishnan, Isha Tripathi
@online{unnikrishnan:20211230:technical:9a058e7, author = {Anandeshwar Unnikrishnan and Isha Tripathi}, title = {{Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability}}, date = {2021-12-30}, organization = {Cloudsek}, url = {https://cloudsek.com/technical-analysis-of-khonsari-ransomware-campaign-exploiting-the-log4shell-vulnerability/}, language = {English}, urldate = {2022-05-25} } Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability
Khonsari
2021-12-22CloudsekAnandeshwar Unnikrishnan
@online{unnikrishnan:20211222:emotet:29082b3, author = {Anandeshwar Unnikrishnan}, title = {{Emotet 2.0: Everything you need to know about the new Variant of the Banking Trojan}}, date = {2021-12-22}, organization = {Cloudsek}, url = {https://web.archive.org/web/20211223100528/https://cloudsek.com/emotet-2-0-everything-you-need-to-know-about-the-new-variant-of-thbanking-trojan/}, language = {English}, urldate = {2022-05-25} } Emotet 2.0: Everything you need to know about the new Variant of the Banking Trojan
Emotet