Click here to download all references as Bib-File.•
2024-11-18
⋅
Kroll
⋅
CARBANAK (aka ANUNAK) Distributed via IDATLOADER (aka HIJACKLOADER) Carbanak HijackLoader |
2024-11-12
⋅
Kroll
⋅
LUMMASTEALER Delivered Via PowerShell Social Engineering Lumma Stealer |
2024-08-14
⋅
Kroll
⋅
REDLINESTEALER Malware Driving the Initial Access Broker Market RedLine Stealer |
2024-06-11
⋅
Kroll
⋅
PLAY Ransomware Group Gains Access via Citrix Bleed Vulnerability PLAY |
2024-03-05
⋅
Kroll
⋅
TODDLERSHARK: ScreenConnect Vulnerability Exploited to Deploy BABYSHARK Variant BabyShark |
2023-06-23
⋅
Kroll
⋅
Deep Dive into GOOTLOADER Malware and Its Infection Chain GootLoader |
2022-12-13
⋅
Kroll
⋅
Threat Actors use Google Ads to Deploy VIDAR Stealer Vidar |
2022-05-27
⋅
Kroll
⋅
Emotet Analysis: New LNKs in the Infection Chain – The Monitor, Issue 20 Emotet |