Click here to download all references as Bib-File.
2022-04-25 ⋅ Mandiant ⋅ INDUSTROYER.V2: Old Malware Learns New Tricks INDUSTROYER2 |
2022-04-13 ⋅ Mandiant ⋅ INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems |
2022-01-31 ⋅ Mandiant ⋅ 1 in 7 Ransomware Extortion Attacks Leak Critical Operational Technology Information |
2021-11-18 ⋅ Mandiant ⋅ Introducing Mandiant's Digital Forensics and Incident Response Framework for Embedded OT Systems |
2021-10-27 ⋅ Mandiant ⋅ Portable Executable File Infecting Malware Is Increasingly Found in OT Networks CCleaner Backdoor Floxif neshta Ramnit Sality Virut |
2021-05-25 ⋅ FireEye ⋅ Crimes of Opportunity: Increasing Frequency of Low Sophistication Operational Technology Compromises |
2020-07-15 ⋅ FireEye ⋅ Financially Motivated Actors Are Expanding Access Into OT: Analysis of Kill Lists That Include OT Processes Used With Seven Malware Families DoppelPaymer LockerGoga Maze MegaCortex Nefilim Snake |