Click here to download all references as Bib-File.•
2024-05-21
⋅
Yoroi
⋅
Uncovering an undetected KeyPlug implant attacking industries in Italy KEYPLUG |
2023-12-18
⋅
Yoroi
⋅
Innovation in Cyber Intrusions: The Evolution of TA544 HijackLoader |
2023-12-06
⋅
Unveiling “Vetta Loader”: A custom loader hitting Italy and spread through infected USB Drives Vetta Loader |
2023-04-13
⋅
Yoroi
⋅
Money Ransomware: The Latest Double Extortion Group Money Message |
2023-03-29
⋅
Yoroi
⋅
DuckTail: Dissecting a complex infection chain started from social engineering DUCKTAIL |
2023-02-15
⋅
Yoroi
⋅
Hunting Cyber Evil Ratels: From the targeted attacks to the widespread usage of Brute Ratel Brute Ratel C4 |
2022-11-17
⋅
Yoroi
⋅
Reconstructing the last activities of Royal Ransomware Royal Ransom |
2022-09-30
⋅
Yoroi
⋅
Dissecting BlueSky Ransomware Payload BlueSky |
2022-07-26
⋅
Yoroi
⋅
On the FootSteps of Hive Ransomware Hive Hive |
2022-07-22
⋅
Yoroi
⋅
On The Footsteps of Hive Ransomware Hive Hive |
2022-05-18
⋅
Yoroi
⋅
A deep dive into Eternity Group: A new emerging Cyber Threat Eternity Ransomware Eternity Stealer Eternity Worm Lilith |
2022-03-08
⋅
Yoroi
⋅
Conti Ransomware source code: a well-designed COTS ransomware Conti |
2022-02-26
⋅
Yoroi
⋅
DiskKill/HermeticWiper, a disruptive cyber-weapon targeting Ukraine’s critical infrastructures HermeticWiper |
2021-12-17
⋅
Yoroi
⋅
Serverless InfoStealer delivered in Est European Countries Agent Tesla |
2021-11-16
⋅
Yoroi
⋅
Office Documents: May the XLL technique change the threat Landscape in 2022? Agent Tesla Dridex Formbook |
2021-10-01
⋅
Yoroi
⋅
Spectre v4.0: the speed of malware threats after the pandemics Spectre Rat |