Click here to download all references as Bib-File.•
2024-05-30
⋅
circleid
⋅
A DNS Investigation of the Phobos Ransomware 8Base Attack 8Base Phobos |
2023-08-24
⋅
circleid
⋅
Signs of MuddyWater Developments Found in the DNS PhonyC2 Storm-1084 |
2021-11-10
⋅
CIRCL
⋅
TR-64 - Exploited Exchange Servers - Mails with links to malware from known/valid senders QakBot |
2020-12-01
⋅
Qianxin
⋅
Blade Eagle Group - Targeted attack group activities circling the Middle East and West Asia's cyberspace revealed SpyNote BladeHawk |
2020-12-01
⋅
CitizenLab
⋅
Running in Circles Uncovering the Clients of Cyberespionage Firm Circles |
2020-11-12
⋅
circleid
⋅
An Investigative Analysis of the Silent Librarian IoCs |
2019-11-20
⋅
360
⋅
Shadow of the Circle Hovering Over Central Asia - The Golden Eagle (APT-C-34) Organizing Attack Revealed RCS APT-C-34 |
2017-12-01
⋅
Check Point
⋅
Nine circles of Cerber Cerber |
2017-01-05
⋅
Twitter (@struppigel)
⋅
Tweet on ComradeCircle Ransomware ComradeCircle |
2014-11-26
⋅
CIRCL
⋅
TR-23 Analysis - NetWiredRC malware NetWire RC |
2014-01-01
⋅
circl.lu
⋅
TR-25 Analysis - Turla / Pfinet / Snake/ Uroburos Cobra Carbon System Uroburos Turla |
2013-05-30
⋅
CIRCL
⋅
Analysis of a stage 3 Miniduke sample MiniDuke |
2013-05-29
⋅
CIRCL
⋅
Malware analysis report of a Backdoor.Snifula variant Snifula |
2013-03-29
⋅
Computer Incident Response Center Luxembourg
⋅
Analysis Report (TLP:WHITE) Analysis of a PlugX variant (PlugX version 7.0) PlugX |