Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-05-04KasperskyDenis Legezo
@online{legezo:20220504:new:02f705f, author = {Denis Legezo}, title = {{A new secret stash for “fileless” malware}}, date = {2022-05-04}, organization = {Kaspersky}, url = {https://securelist.com/a-new-secret-stash-for-fileless-malware/106393/}, language = {English}, urldate = {2022-05-09} } A new secret stash for “fileless” malware
Cobalt Strike
2022-01-20Kaspersky LabsMark Lechtik, Vasily Berdnikov, Denis Legezo, Ilya Borisov
@techreport{lechtik:20220120:technical:fa16a24, author = {Mark Lechtik and Vasily Berdnikov and Denis Legezo and Ilya Borisov}, title = {{Technical details of MoonBounce’s implementation}}, date = {2022-01-20}, institution = {Kaspersky Labs}, url = {https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/01/19115831/MoonBounce_technical-details_eng.pdf}, language = {English}, urldate = {2022-01-25} } Technical details of MoonBounce’s implementation
MoonBounce
2022-01-20KasperskyMark Lechtik, Vasily Berdnikov, Denis Legezo, Ilya Borisov
@online{lechtik:20220120:moonbounce:cd173f1, author = {Mark Lechtik and Vasily Berdnikov and Denis Legezo and Ilya Borisov}, title = {{MoonBounce: the dark side of UEFI firmware}}, date = {2022-01-20}, organization = {Kaspersky}, url = {https://securelist.com/moonbounce-the-dark-side-of-uefi-firmware/105468/}, language = {English}, urldate = {2022-01-24} } MoonBounce: the dark side of UEFI firmware
MoonBounce
2021-07-07KasperskyDenis Legezo
@online{legezo:20210707:wildpressure:0bdf5ef, author = {Denis Legezo}, title = {{WildPressure targets the macOS platform}}, date = {2021-07-07}, organization = {Kaspersky}, url = {https://securelist.com/wildpressure-targets-macos/103072/}, language = {English}, urldate = {2021-07-09} } WildPressure targets the macOS platform
Guard Milum
2020-10-08Kaspersky LabsDenis Legezo
@online{legezo:20201008:montysthree:77664e4, author = {Denis Legezo}, title = {{MontysThree: Industrial espionage with steganography and a Russian accent on both sides}}, date = {2020-10-08}, organization = {Kaspersky Labs}, url = {https://securelist.com/montysthree-industrial-espionage/98972/}, language = {English}, urldate = {2020-10-12} } MontysThree: Industrial espionage with steganography and a Russian accent on both sides
MontysThree
2020-06-19Kaspersky LabsDenis Legezo
@online{legezo:20200619:microcin:122f2ca, author = {Denis Legezo}, title = {{Microcin is here With asynchronous sockets, steganography, GitLab ban and a sock}}, date = {2020-06-19}, organization = {Kaspersky Labs}, url = {https://securelist.com/microcin-is-here/97353/}, language = {English}, urldate = {2020-06-21} } Microcin is here With asynchronous sockets, steganography, GitLab ban and a sock
Microcin
2020-05-18Github (dlegezo)Denis Legezo
@online{legezo:20200518:microcin:b3147b6, author = {Denis Legezo}, title = {{Microcin Decryptor}}, date = {2020-05-18}, organization = {Github (dlegezo)}, url = {https://github.com/dlegezo/common}, language = {English}, urldate = {2020-05-19} } Microcin Decryptor
Microcin
2020-03-24Kaspersky LabsDenis Legezo
@online{legezo:20200324:wildpressure:add6905, author = {Denis Legezo}, title = {{WildPressure targets industrial-related entities in the Middle East}}, date = {2020-03-24}, organization = {Kaspersky Labs}, url = {https://securelist.com/wildpressure-targets-industrial-in-the-middle-east/96360/}, language = {English}, urldate = {2020-03-26} } WildPressure targets industrial-related entities in the Middle East
Milum
2019-01-30Kaspersky LabsDenis Legezo
@online{legezo:20190130:chafer:bb3ce4d, author = {Denis Legezo}, title = {{Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities}}, date = {2019-01-30}, organization = {Kaspersky Labs}, url = {https://securelist.com/chafer-used-remexi-malware/89538/}, language = {English}, urldate = {2019-12-20} } Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities
Remexi APT39
2018-06-13Kaspersky LabsDenis Legezo
@online{legezo:20180613:luckymouse:26f9860, author = {Denis Legezo}, title = {{LuckyMouse hits national data center to organize country-level waterholing campaign}}, date = {2018-06-13}, organization = {Kaspersky Labs}, url = {https://securelist.com/luckymouse-hits-national-data-center/86083/}, language = {English}, urldate = {2019-12-20} } LuckyMouse hits national data center to organize country-level waterholing campaign
HyperBro EMISSARY PANDA
2016-11-23Kaspersky LabsDenis Legezo
@online{legezo:20161123:inpage:4e588c5, author = {Denis Legezo}, title = {{InPage zero-day exploit used to attack financial institutions in Asia}}, date = {2016-11-23}, organization = {Kaspersky Labs}, url = {https://securelist.com/inpage-zero-day-exploit-used-to-attack-financial-institutions-in-asia/76717/}, language = {English}, urldate = {2022-01-03} } InPage zero-day exploit used to attack financial institutions in Asia
BioData