Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-06-25Cado SecurityNate Bill
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer
P2Pinfect
2023-12-04Cado SecurityMatt Muir
P2Pinfect - New Variant Targets MIPS Devices
P2Pinfect
2023-10-18Cado SecurityMatt Muir, Nate Bill
Qubitstrike - An Emerging Malware Campaign Targeting Jupyter Notebooks
2023-09-20Cado SecurityMatt Muir
Cado Security Labs Researchers Witness a 600X Increase in P2Pinfect Traffic
P2Pinfect
2023-07-31Cado SecurityMatt Muir, Nate Bill
Cado Security Labs Encounter Novel Malware, Redis P2Pinfect
P2Pinfect
2023-06-15Cado SecurityCado Security
Tracking Diicot: an emerging Romanian threat actor
2023-03-30Cado SecurityCado Security
Forensic Triage of a Windows System running the Backdoored 3CX Desktop App
3CX Backdoor
2022-05-18Cado SecurityMatt Muir
Linux Attack Techniques: Dynamic Linker Hijacking with LD Preload
2022-04-06Cado SecurityAl Carchrie, Chris Doman, Matt Muir, Paul Scott
Cado Discovers Denonia: The First Malware Specifically Targeting Lambda
Denonia
2022-02-20Cado SecurityCado Security
Technical Analysis of the DDoS Attacks against Ukrainian Websites
Mirai
2022-02-02Cado SecurityCado Security
CoinStomp Malware Family Targets Asian Cloud Service Providers
2022-01-20Cado SecurityCado Security
Fallout from Log4Shell-related Vietnamese Cryptocurrency Exchange Attack: KYC Data for Sale on Dark Web
2022-01-17Cado SecurityCado Security
Resources for DFIR Professionals Responding to WhisperGate Malware
WhisperGate
2022-01-10Cado SecurityMatt Muir
Abcbot - An Evolution of Xanthe
Abcbot Xanthe
2021-12-21Cado SecurityMatt Muir
The Continued Evolution of Abcbot
Abcbot
2021-12-14Cado SecurityMatt Muir
Analysis of Novel Khonsari Ransomware Deployed by the Log4Shell Vulnerability
Khonsari
2021-12-13Cado SecurityCado Security
Analysis of Initial In The Wild Attacks Exploiting Log4Shell/Log4J/CVE-2021-44228
Kinsing Mirai Tsunami
2021-10-23Cado SecurityCado Security
Links to Previous Attacks in UAParserJS Compromise
2021-09-14Cado SecurityCado Security
TeamTNT Script Employed to Grab AWS Credentials
TeamTNT Tsunami
2021-07-14Cado SecurityChristopher Doman
Triage analysis of Serv-U FTP user backdoor deployed by CVE-2021-35211 (DEV-0322)
2021-07-13Cado SecurityChristopher Doman
Resources for Investigating Cloud and Container Penetration Testing Tools
2021-04-06Cado Securitycadolabs
Threat Group Uses Voice Changing Software in Espionage Attempt
Houdini
2021-02-10Cado SecurityChristopher Doman
Punk Kitty Ransom - Analysing HelloKitty Ransomware Attacks
HelloKitty
2021-01-18Cado Securitycadolabs
Botnet Deploys Cloud and Container Attack Techniques
2020-12-14Cado SecurityChristopher Doman
Responding to Solarigate
SUNBURST
2020-08-17Cado SecurityChris Doman
Team TNT – The First Crypto-Mining Worm to Steal AWS Credentials
TeamTNT TeamTNT
2020-08-17Cado SecurityChris Doman, James Campbell
Team TNT - The First Crypto-Mining Worm to Steal AWS Credentials
TeamTNT
2020-06-11Cado SecurityChris Doman, James Campbell
An Ongoing AWS Phishing Campaign
2020-05-16Cado SecurityChris Doman, James Campbell
Recent Attacks Against Supercomputers
Loerbas