Click here to download all references as Bib-File.•
| 2025-04-23
⋅
Trend Micro
⋅
Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations BeaverTail FrostyFerret GolangGhost InvisibleFerret GolangGhost WageMole |
| 2024-12-17
⋅
Trend Micro
⋅
Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks |
| 2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb |
| 2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb Water Barghest |
| 2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghests Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb |
| 2024-05-01
⋅
Trend Micro
⋅
Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks Ngioweb SSHDoor |
| 2024-01-31
⋅
Trend Micro
⋅
Pawn Storm Uses Brute Force and Stealth Against High-Value Targets Mocky LNK Unidentified 114 (APT28 InfoStealer) |
| 2023-05-30
⋅
Trend Micro
⋅
Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals ROMCOM RAT RomCom |
| 2022-11-08
⋅
DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework DeimosC2 |
| 2022-03-17
⋅
Trendmicro
⋅
Cyclops Blink Sets Sights on Asus Routers (Appendix) CyclopsBlink |
| 2022-03-17
⋅
Trendmicro
⋅
Cyclops Blink Sets Sights on Asus Routers CyclopsBlink |
| 2021-06-08
⋅
Trend Micro
⋅
Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them Nefilim |
| 2020-12-17
⋅
Trend Micro
⋅
Pawn Storm’s Lack of Sophistication as a Strategy DriveOcean |
| 2020-03-11
⋅
Trend Micro
⋅
Pawn Storm in 2019: A Year of Scanning and Credential Phishing on High-Profile Targets |
| 2019-12-12
⋅
Trend Micro
⋅
More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting APT33 |
| 2016-03-01
⋅
Trend Micro
⋅
Operation C-Major: Information Theft Campaign Targets Military Personnel in India Operation C-Major |
| 2015-10-22
⋅
Trend Micro
⋅
Pawn Storm Targets MH17 Investigation Team APT28 |
| 2015-10-13
⋅
Trend Micro
⋅
New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries APT28 |
| 2015-10-13
⋅
Trend Micro
⋅
New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries Seduploader |
| 2015-02-04
⋅
Trend Micro
⋅
Pawn Storm Update: iOS Espionage App Found X-Agent |
| 2014-10-27
⋅
Trend Micro
⋅
Operation Pawn Storm: Using Decoys to Evade Detection Sedreco Seduploader APT28 |
| 2014-10-01
⋅
Trend Micro
⋅
Operation Pawn Storm: Using Decoys to Evade Detection |
| 2012-01-01
⋅
CSIS Trend Micro
⋅
W32.Tinba (Tinybanker) The Turkish Incident Tinba |