Click here to download all references as Bib-File.•
2022-01-13
⋅
Trustwave
⋅
Decrypting Qakbot’s Encrypted Registry Keys QakBot |
2021-10-15
⋅
Trustwave
⋅
BlackByte Ransomware – Pt 2. Code Obfuscation Analysis |
2021-10-15
⋅
Trustwave
⋅
BlackByte Ransomware – Pt. 1 In-depth Analysis |
2021-07-03
⋅
Twitter (@LloydLabs)
⋅
Twitter Thread on Revil sideloading DLL used in Kaseya attack REvil |
2021-05-04
⋅
Trustwave
⋅
Pingback: Backdoor At The End Of The ICMP Tunnel PingBack |
2020-04-10
⋅
Trustwave
⋅
An In-depth Look at MailTo Ransomware, Part Three of Three Mailto |
2020-04-08
⋅
Trustwave
⋅
An In-depth Look at MailTo Ransomware, Part Two of Three Mailto |
2020-03-31
⋅
Trustwave
⋅
An In-depth Look at MailTo Ransomware, Part One of Three Mailto |
2017-11-17
⋅
LloydLabs
⋅
[Part 1] - Analysing the New Linux/AES.DDoS IoT Malware MrBlack |
2007-04-03
⋅
USENIX
⋅
A Case Study of the Rustock Rootkit and Spam Bot Rustock |