Click here to download all references as Bib-File.
2023-06-23 ⋅ Kroll ⋅ Deep Dive into GOOTLOADER Malware and Its Infection Chain GootLoader |
2023-02-13 ⋅ Kroll ⋅ Royal Ransomware Deep Dive Cobalt Strike Royal Ransom |
2023-02-02 ⋅ Kroll ⋅ Hive Ransomware Technical Analysis and Initial Access Discovery BATLOADER Cobalt Strike Hive |
2023-01-23 ⋅ Kroll ⋅ Black Basta – Technical Analysis Black Basta Cobalt Strike MimiKatz QakBot SystemBC |
2022-12-13 ⋅ Kroll ⋅ Threat Actors use Google Ads to Deploy VIDAR Stealer Vidar |
2022-06-02 ⋅ Kroll ⋅ ModPipe POS Malware: New Hooking Targets Extract Card Data ModPipe |
2022-05-27 ⋅ Kroll ⋅ Emotet Analysis: New LNKs in the Infection Chain – The Monitor, Issue 20 Emotet |
2022-04-18 ⋅ RiskIQ ⋅ RiskIQ: Trickbot Rickroll TrickBot |
2022-03-22 ⋅ Kroll ⋅ Analyzing Exmatter: A Ransomware Data Exfiltration Tool ExMatter |