Click here to download all references as Bib-File.•
2025-05-16
⋅
Gdata
⋅
Printer company provided infected software downloads for half a year SnipVex |
2025-04-30
⋅
Seqrite
⋅
Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government Crimson RAT |
2025-04-29
⋅
Trustwave
⋅
Yet Another NodeJS Backdoor (YaNB): A Modern Challenge KongTuke |
2025-04-14
⋅
Palo Alto Networks Unit 42
⋅
Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware RN Stealer |
2025-03-25
⋅
JPCERT/CC
⋅
Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup |
2025-03-04
⋅
Department of Justice
⋅
10 Chinese Nationals Charged With Large-Scale Hacking Of U.S. And International Victims On Behalf Of The Chinese Government |
2025-01-13
⋅
Halcyon
⋅
Abusing AWS Native Services: Ransomware Encrypting S3 Buckets with SSE-C Codefinger |
2024-12-30
⋅
Fortinet
⋅
Catching "EC2 Grouper"- no indicators required! EC2 Grouper |
2024-12-19
⋅
SpyCloud
⋅
LummaC2 Revisited: What’s Making this Stealer Stealthier and More Lethal GhostSocks Lumma Stealer |
2024-08-09
⋅
Palo Alto Networks Unit 42
⋅
Ransomware Review: First Half of 2024 Ukrainian Cyber Alliance |
2024-04-17
⋅
Mandiant
⋅
Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm Sandworm |
2024-04-16
⋅
Mandiant
⋅
APT44: Unearthing Sandworm VPNFilter BlackEnergy CaddyWiper EternalPetya HermeticWiper Industroyer INDUSTROYER2 Olympic Destroyer PartyTicket RoarBAT Sandworm |
2024-04-04
⋅
Mandiant
⋅
Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies UNC3569 UNC5266 UNC5291 UNC5330 UNC5337 UTA0178 |
2024-04-04
⋅
Mandiant
⋅
Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies TONERJAM |
2024-01-18
⋅
Detect Mortis Locker Ransomware with YARA Mortis |
2023-11-21
⋅
Palo Alto Networks Unit 42
⋅
Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors BeaverTail InvisibleFerret WageMole |
2023-09-29
⋅
ESET Research
⋅
Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company CLOUDBURST LightlessCan miniBlindingCan sRDI |
2023-09-15
⋅
Migeel.sk
⋅
Reverse engineering natively-compiled .NET apps |
2023-08-23
⋅
Logpoint
⋅
Defending Against 8base: Uncovering Their Arsenal and Crafting Responses 8Base Phobos SmokeLoader SystemBC |
2023-07-24
⋅
M4lcode
⋅
Deep Analysis of Vidar Stealer Arkei Stealer Vidar |