Click here to download all references as Bib-File.•
2024-05-01
⋅
Trend Micro
⋅
Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks SSHDoor |
2024-01-31
⋅
Trend Micro
⋅
Pawn Storm Uses Brute Force and Stealth Against High-Value Targets Mocky LNK Unidentified 114 (APT28 InfoStealer) |
2023-07-13
⋅
Trend Micro
⋅
Detecting BPFDoor Backdoor Variants Abusing BPF Filters BPFDoor Symbiote |
2023-05-30
⋅
Trend Micro
⋅
Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals ROMCOM RAT RomCom |
2022-11-08
⋅
DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework DeimosC2 |
2022-03-17
⋅
Trendmicro
⋅
Cyclops Blink Sets Sights on Asus Routers (Appendix) CyclopsBlink |
2022-03-17
⋅
Trendmicro
⋅
Cyclops Blink Sets Sights on Asus Routers CyclopsBlink |
2022-01-20
⋅
Trend Micro
⋅
Backing Your Backup Defending NAS Devices Against Evolving Threats QNAPCrypt QSnatch |
2021-10-15
⋅
Trend Micro
⋅
Ransomware Operators Found Using New "Franchise" Business Model Glupteba IcedID Mount Locker |
2021-06-08
⋅
Trend Micro
⋅
Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them Nefilim |
2021-01-19
⋅
Trend Micro
⋅
VPNFilter Two Years Later: Routers Still Compromised VPNFilter |
2020-07-28
⋅
Trend Micro
⋅
Mirai Botnet Exploit Weaponized to Attack IoT Devices via CVE-2020-5902 Mirai |
2018-06-07
⋅
Trend Micro
⋅
New KillDisk Variant Hits Latin American Financial Organizations Again BOOTWRECK |
2017-12-14
⋅
Trend Micro
⋅
Dissecting PRILEX and CUTLET MAKER ATM Malware Families Prilex |
2016-09-05
⋅
Trend Micro
⋅
Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems Umbreon |
2014-10-27
⋅
Trend Micro
⋅
Operation Pawn Storm: Using Decoys to Evade Detection Sedreco Seduploader APT28 |
2014-10-01
⋅
Trend Micro
⋅
Operation Pawn Storm: Using Decoys to Evade Detection |
2014-01-27
⋅
Trend Micro
⋅
CPL Malware: Malicious Control Panel Items Banload Mevade |