Click here to download all references as Bib-File.•
| 2025-08-28
⋅
cocomelonc
⋅
Malware development trick 51: steal data via legit Bitbucket API. Simple C example. |
| 2025-04-04
⋅
Socket
⋅
Lazarus Expands Malicious npm Campaign: 11 New Packages Add Malware Loaders and Bitbucket Payloads BeaverTail InvisibleFerret |
| 2020-03-25
⋅
Bitdefender
⋅
New Router DNS Hijacking Attacks Abuse Bitbucket to Host Infostealer Oski Stealer |
| 2020-02-06
⋅
Gdata
⋅
40,000 CryptBot Downloads per Day: Bitbucket Abused as Malware Slinger CryptBot |
| 2020-02-05
⋅
Cybereason
⋅
The Hole in the Bucket: Attackers Abuse Bitbucket to Deliver an Arsenal of Malware Amadey Azorult Predator The Thief STOP Vidar |
| 2014-11-04
⋅
BitBucket
⋅
IDApatchwork Repository Nymaim |