Click here to download all references as Bib-File.
2023-03-30 ⋅ Huntress Labs ⋅ 3CX VoIP Software Compromise & Supply Chain Threats 3CX Backdoor |
2022-10-04 ⋅ YouTube (John Hammond) ⋅ HAVOC C2 - Demon Bypasses Windows 11 Defender Havoc |
2022-03-01 ⋅ Huntress Labs ⋅ Targeted APT Activity: BABYSHARK Is Out for Blood BabyShark |
2022-02-18 ⋅ YouTube (John Hammond) ⋅ Uncovering NETWIRE Malware - Discovery & Deobfuscation NetWire RC |
2021-09-22 ⋅ YouTube (John Hammond) ⋅ Snip3 Crypter/RAT Loader - DcRat MALWARE ANALYSIS DCRat |
2021-08-19 ⋅ Huntress Labs ⋅ Microsoft Exchange Servers Still Vulnerable to ProxyShell Exploit |
2021-07-27 ⋅ Youtube (SANS Institute) ⋅ SANS Threat Analysis Rundown - Kaseya VSA attack REvil |
2021-07-20 ⋅ Huntress Labs ⋅ Security Researchers’ Hunt to Discover Origins of the Kaseya VSA Mass Ransomware Incident REvil |
2021-07-13 ⋅ YouTube (John Hammond) ⋅ JScript Deobfuscation - More WSHRAT (Malware Analysis) Houdini |
2021-04-05 ⋅ Huntress Labs ⋅ From PowerShell to Payload: An Analysis of Weaponized Malware |
2021-03-09 ⋅ YouTube (John Hammond) ⋅ HAFNIUM - Post-Exploitation Analysis from Microsoft Exchange CHINACHOPPER |
2021-03-03 ⋅ Huntress Labs ⋅ Rapid Response: Mass Exploitation of On-Prem Exchange Servers CHINACHOPPER HAFNIUM |
2021-03-01 ⋅ YouTube (John Hammond) ⋅ Mozi Malware - Finding Breadcrumbs... Mozi |
2021-01-28 ⋅ Huntress Labs ⋅ Analyzing Ryuk Another Link in the Cyber Attack Chain BazarBackdoor Ryuk |