Click here to download all references as Bib-File.
2022-05-04 ⋅ F-Secure ⋅ Scheduled Task Tampering |
2021-05-10 ⋅ F-Secure ⋅ Prelude to Ransomware: SystemBC SystemBC |
2021-04-09 ⋅ F-Secure ⋅ Detecting Exposed Cobalt Strike DNS Redirectors Cobalt Strike |
2021-03-30 ⋅ F-Secure ⋅ Attack landscape update: Ransomware 2.0, automated recon, and supply chain attacks |
2020-11-20 ⋅ F-Secure Labs ⋅ Detecting Cobalt Strike Default Modules via Named Pipe Analysis Cobalt Strike |
2020-10-23 ⋅ F-Secure Labs ⋅ Catching Lazarus: Threat Intelligence to Real Detection Logic - Part Two MimiKatz |
2020-10-20 ⋅ F-Secure ⋅ Incident Readiness: Preparing a proactive response to attacks MimiKatz |
2020-09-25 ⋅ F-Secure Labs ⋅ Catching Lazarus: Threat Intelligence to Real Detection Logic - Part One |
2020-08-18 ⋅ F-Secure Labs ⋅ Lazarus Group: Campaign Targeting the Cryptocurrency Vertical |
2020-08-18 ⋅ F-Secure ⋅ Lazarus Group Campaign Targeting the Cryptocurrency Vertical |
2020-07-16 ⋅ F-Secure ⋅ US, UK, and Canada’s COVID-19 research targeted by APT29 |
2020-07-03 ⋅ F-Secure Labs ⋅ Attack Detection Fundamentals: Code Execution and Persistence - Lab #1 Astaroth |
2020-05-06 ⋅ F-Secure Labs ⋅ 039| Deconstructing the Dukes: A Researcher’s Retrospective of APT29 OnionDuke |
2019-03-29 ⋅ F-Secure ⋅ A Hammer Lurking In The Shadows shadowhammer |
2019-03-28 ⋅ F-Secure ⋅ Analysis of ShadowHammer ASUS Attack First Stage Payload shadowhammer |
2017-10-27 ⋅ F-Secure ⋅ The big difference with Bad Rabbit EternalPetya |
2017-04 ⋅ F-Secure ⋅ CALLISTO GROUP RCS Callisto |
2016-08-05 ⋅ F-Secure ⋅ NANHAISHU: RATing the South China Sea NanHaiShu |
2015-09-17 ⋅ F-Secure ⋅ The Dukes: 7 Years Of Russian Cyber-Espionage TwoFace BONDUPDATER DNSpionage |
2015-09-17 ⋅ F-Secure ⋅ The Dukes: 7 Years Of Russian Cyber-Espionage APT29 |