Click here to download all references as Bib-File.
2023-08-08 ⋅ Checkpoint ⋅ THE RHYSIDA RANSOMWARE: ACTIVITY ANALYSIS AND TIES TO VICE SOCIETY Rhysida |
2023-07-03 ⋅ Check Point Research ⋅ Chinese Threat Actors Targeting Europe in SmugX Campaign PlugX SmugX |
2023-06-08 ⋅ Check Point Research ⋅ Stealth Soldier Backdoor Used in Targeted Espionage Attacks in North Africa Stealth Soldier |
2023-03-27 ⋅ Check Point Research ⋅ Rhadamanthys: The “Everything Bagel” Infostealer Rhadamanthys |
2022-11-02 ⋅ Twitter (@_CPResearch_) ⋅ Tweet on Azov Wiper Azov Wiper |
2021-12-27 ⋅ A Deep Dive into DoubleFeature, Equation Group’s Post-Exploitation Dashboard Equationgroup (Sorting) Fanny MISTYVEAL PeddleCheap |
2021-08-14 ⋅ Check Point Research ⋅ Indra — Hackers Behind Recent Attacks on Iran Meteor Predatory Sparrow |
2021-02-08 ⋅ Checkpoint ⋅ After Lightning Comes Thunder Infy Tonnerre |
2020-11-26 ⋅ Check Point ⋅ Bandook: Signed & Delivered Bandook Dark Caracal |
2019-07-10 ⋅ Check Point Research ⋅ Agent Smith: A New Species of Mobile Malware Agent Smith |