Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-01-31Trend MicroFeike Hacquebord, Fernando Mercês
Pawn Storm Uses Brute Force and Stealth Against High-Value Targets
Mocky LNK Unidentified 114 (APT28 InfoStealer)
2023-07-13Trend MicroFernando Mercês
Detecting BPFDoor Backdoor Variants Abusing BPF Filters
BPFDoor Symbiote
2023-05-30Trend MicroFeike Hacquebord, Fernando Mercês, Lord Alfred Remorin, Stephen Hilt
Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals
ROMCOM RAT RomCom
2022-11-08Feike Hacquebord, Fernando Mercês, Stephen Hilt
DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework
DeimosC2
2022-03-17TrendmicroFeike Hacquebord, Fernando Mercês, Stephen Hilt
Cyclops Blink Sets Sights on Asus Routers (Appendix)
CyclopsBlink
2022-03-17TrendmicroFeike Hacquebord, Fernando Mercês, Stephen Hilt
Cyclops Blink Sets Sights on Asus Routers
CyclopsBlink
2022-01-20Trend MicroFernando Mercês, Stephen Hilt
Backing Your Backup Defending NAS Devices Against Evolving Threats
QNAPCrypt QSnatch
2021-10-15Trend MicroFernando Mercês
Ransomware Operators Found Using New "Franchise" Business Model
Glupteba IcedID Mount Locker
2021-06-08Trend MicroDavid Sancho, Feike Hacquebord, Fernando Mercês, Ian Kenefick, Mayra Fuentes, Robert McArdle, Stephen Hilt, Vladimir Kropotov
Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them
Nefilim
2021-01-19Trend MicroFernando Mercês, Stephen Hilt
VPNFilter Two Years Later: Routers Still Compromised
VPNFilter
2020-07-28Trend MicroFernando Mercês
Mirai Botnet Exploit Weaponized to Attack IoT Devices via CVE-2020-5902
Mirai
2018-06-07Trend MicroFernando Mercês
New KillDisk Variant Hits Latin American Financial Organizations Again
BOOTWRECK
2017-12-14Trend MicroDavid Sancho, Fernando Mercês
Dissecting PRILEX and CUTLET MAKER ATM Malware Families
Prilex
2016-09-05Trend MicroFernando Mercês
Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems
Umbreon
2014-10-27Trend MicroAlfred Remorin, Douglas Otis, Feike Hacquebord, Fernando Mercês, Jim Gogolinski, Loucif Kharouni, Numaan Huq
Operation Pawn Storm: Using Decoys to Evade Detection
Sedreco Seduploader APT28
2014-10-01Trend MicroAlfred Remorin, Douglas Otis, Feike Hacquebord, Fernando Mercês, Jim Gogolinski, Loucif Kharouni, Numaan Huq
Operation Pawn Storm: Using Decoys to Evade Detection
2014-01-27Trend MicroFernando Mercês
CPL Malware: Malicious Control Panel Items
Banload Mevade