Click here to download all references as Bib-File.•
| 2025-09-09
⋅
Huntress Labs
⋅
How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations |
| 2024-06-05
⋅
Mandiant
⋅
Phishing for Gold: Cyber Threats Facing the 2024 Paris Olympics Callisto |
| 2024-04-25
⋅
Mandiant
⋅
Poll Vaulting: Cyber Threats to Global Elections Callisto |
| 2022-05-25
⋅
CrowdStrike
⋅
Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun BPFDoor |
| 2021-10-19
⋅
CrowdStrike
⋅
LightBasin: A Roaming Threat to Telecommunications Companies LightBasin |
| 2021-07-07
⋅
Elastic
⋅
Elastic Security prevents 100% of REvil ransomware samples REvil |
| 2021-03-06
⋅
Click All the Things! Blog
⋅
oleObject1.bin – OLe10nATive – shellcode CloudEyE |
| 2021-02-02
⋅
Click All the Things! Blog
⋅
XLSB: Analyzing a Microsoft Excel Binary Spreadsheet |
| 2021-01-26
⋅
Digital Shadows
⋅
Ransomware: Analyzing the data from 2020 |
| 2020-12-16
⋅
Click All the Things! Blog
⋅
Snake/404 Keylogger, BIFF, and Covering Tracks?: An unusual maldoc |
| 2020-12-02
⋅
Kryptos Logic
⋅
Automated string de-gobfuscation Blackrota |
| 2020-09-24
⋅
Click All the Things! Blog
⋅
zLoader XLM Update: Macro code and behavior change Zloader |
| 2020-06-19
⋅
Click All the Things! Blog
⋅
zloader: VBA, R1C1 References, and Other Tomfoolery Zloader |
| 2020-05-25
⋅
Elastic
⋅
The Elastic Guide to Threat Hunting |
| 2020-03-31
⋅
Click All the Things! Blog
⋅
LokiBot: Getting Equation Editor Shellcode Loki Password Stealer (PWS) |