Click here to download all references as Bib-File.•
2024-05-01
⋅
Trend Micro
⋅
Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks SSHDoor |
2024-01-31
⋅
Trend Micro
⋅
Pawn Storm Uses Brute Force and Stealth Against High-Value Targets Mocky LNK Unidentified 114 (APT28 InfoStealer) |
2023-05-30
⋅
Trend Micro
⋅
Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals ROMCOM RAT RomCom |
2022-11-08
⋅
DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework DeimosC2 |
2022-03-17
⋅
Trendmicro
⋅
Cyclops Blink Sets Sights on Asus Routers (Appendix) CyclopsBlink |
2022-03-17
⋅
Trendmicro
⋅
Cyclops Blink Sets Sights on Asus Routers CyclopsBlink |
2021-06-08
⋅
Trend Micro
⋅
Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them Nefilim |
2020-12-17
⋅
Trend Micro
⋅
Pawn Storm’s Lack of Sophistication as a Strategy DriveOcean |
2020-03-11
⋅
Trend Micro
⋅
Pawn Storm in 2019: A Year of Scanning and Credential Phishing on High-Profile Targets |
2019-12-12
⋅
Trend Micro
⋅
More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting APT33 |
2016-03-01
⋅
Trend Micro
⋅
Operation C-Major: Information Theft Campaign Targets Military Personnel in India Operation C-Major |
2015-10-22
⋅
Trend Micro
⋅
Pawn Storm Targets MH17 Investigation Team APT28 |
2015-10-13
⋅
Trend Micro
⋅
New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries APT28 |
2015-10-13
⋅
Trend Micro
⋅
New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries Seduploader |
2015-02-04
⋅
Trend Micro
⋅
Pawn Storm Update: iOS Espionage App Found X-Agent |
2014-10-27
⋅
Trend Micro
⋅
Operation Pawn Storm: Using Decoys to Evade Detection Sedreco Seduploader APT28 |
2014-10-01
⋅
Trend Micro
⋅
Operation Pawn Storm: Using Decoys to Evade Detection |
2012-01-01
⋅
CSIS Trend Micro
⋅
W32.Tinba (Tinybanker) The Turkish Incident Tinba |