Click here to download all references as Bib-File.
2023-04-13 ⋅ Yoroi ⋅ Money Ransomware: The Latest Double Extortion Group Money Message |
2023-03-29 ⋅ Yoroi ⋅ DuckTail: Dissecting a complex infection chain started from social engineering DUCKTAIL |
2023-02-15 ⋅ Yoroi ⋅ Hunting Cyber Evil Ratels: From the targeted attacks to the widespread usage of Brute Ratel Brute Ratel C4 |
2022-11-17 ⋅ Yoroi ⋅ Reconstructing the last activities of Royal Ransomware Royal Ransom |
2022-09-30 ⋅ Yoroi ⋅ Dissecting BlueSky Ransomware Payload BlueSky |
2022-07-26 ⋅ Yoroi ⋅ On the FootSteps of Hive Ransomware Hive Hive |
2022-07-22 ⋅ Yoroi ⋅ On The Footsteps of Hive Ransomware Hive Hive |
2022-05-18 ⋅ Yoroi ⋅ A deep dive into Eternity Group: A new emerging Cyber Threat Eternity Ransomware Eternity Stealer Eternity Worm Lilith |
2022-03-08 ⋅ Yoroi ⋅ Conti Ransomware source code: a well-designed COTS ransomware Conti |
2022-02-26 ⋅ Yoroi ⋅ DiskKill/HermeticWiper, a disruptive cyber-weapon targeting Ukraine’s critical infrastructures HermeticWiper |
2021-12-17 ⋅ Yoroi ⋅ Serverless InfoStealer delivered in Est European Countries Agent Tesla |
2021-11-16 ⋅ Yoroi ⋅ Office Documents: May the XLL technique change the threat Landscape in 2022? Agent Tesla Dridex Formbook |
2021-10 ⋅ Yoroi ⋅ Spectre v4.0: the speed of malware threats after the pandemics Spectre Rat |