Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-25SpyCloudJames
On the Hunt for Ghost(Socks)
GhostSocks
2025-03-12MandiantFrank Tse, Jakub Jozwiak, Logeswaran Nadarajan, Lukasz Lamparski, Mathew Potaczek, Mustafa Nasser, Nick Harbour, Punsaen Boonyakarn, Shawn Chew
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers
tsh
2025-02-28Palo Alto Networks Unit 42Margaret Kelley
JavaGhost’s Persistent Phishing Attacks From the Cloud
JavaGhost
2025-02-25Sentinel LABSTom Hegel
Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition
2025-02-20InfrawatchInfrawatch Research Team
GhostSocks - Lumma's Partner In Proxy
GhostSocks Lumma Stealer
2025-02-19CISACISA
#StopRansomware: Ghost (Cring) Ransomware
Cring
2025-02-15Medium TRAC LabsTRAC Labs
Don’t Ghost the SocGholish: GhostWeaver Backdoor
FAKEUPDATES
2025-01-23Hunt.ioHunt.io
Mapping Suspected KEYPLUG Infrastructure: TLS Certificates, GhostWolf, and RedGolf/APT41 Activity
KEYPLUG
2024-10-19ElasticSalim Bitam
Tricks and Treats: GHOSTPULSE’s new pixel- level deception
HijackLoader
2024-07-24Check Point ResearchAntonis Terefos
Stargazers Ghost Network
Atlantida Lumma Stealer RedLine Stealer Rhadamanthys RisePro Stargazer Goblin
2024-07-17SYGNIADor Nizar
The Return of Ghost Emperor’s Demodex
GhostEmperor GhostEmperor
2024-05-22DARKReadingElizabeth Montalbano
Novel EDR-Killing 'GhostEngine' Malware Is Built for Stealth
win.ghostengine
2024-05-21ElasticAndrew Pease, Salim Bitam, Samir Bousseaden, Terrance DeJesus
Invisible miners: unveiling GHOSTENGINE’s crypto mining operations
win.ghostengine
2024-05-07ElasticElastic
Elastic Security - GhostEngine YARA Rule
win.ghostengine
2024-02-05@g0njxa
Tweet Highlighting the Integration of GhostSocks Service into Lumma Stealer
GhostSocks
2023-12-20ThreatMonKerime Gencay
GhostLocker Ransomware Analysis Report (Paywall)
GhostLocker
2023-11-03UptycsShilpesh Trivedi, Uptycs Threat Research
GhostSec: From Fighting ISIS to Possibly Targeting Israel with RaaS
GhostLocker GhostSec
2023-10-27ElasticJoe Desimone, Salim Bitam
GHOSTPULSE haunts victims using defense evasion bag o' tricks
HijackLoader Lumma Stealer NetSupportManager RAT Rhadamanthys SectopRAT Vidar
2023-06-16SOC PrimeVeronika Telychko
PicassoLoader and Cobalt Strike Beacon Detection: UAC-0057 aka GhostWriter Hacking Group Attacks the Ukrainian Leading Military Educational Institution
Cobalt Strike PicassoLoader Ghostwriter
2023-04-13Intel 471Jorge Rodriguez, Souhail Hammou
From GhostNet to PseudoManuscrypt - The evolution of Gh0st RAT
BBSRAT Gh0stTimes Ghost RAT PseudoManuscrypt