Click here to download all references as Bib-File.•
| 2022-01-13
⋅
Trustwave
⋅
Decrypting Qakbot’s Encrypted Registry Keys QakBot |
| 2021-10-15
⋅
Trustwave
⋅
BlackByte Ransomware – Pt 2. Code Obfuscation Analysis |
| 2021-10-15
⋅
Trustwave
⋅
BlackByte Ransomware – Pt. 1 In-depth Analysis |
| 2021-07-03
⋅
Twitter (@LloydLabs)
⋅
Twitter Thread on Revil sideloading DLL used in Kaseya attack REvil |
| 2021-05-04
⋅
Trustwave
⋅
Pingback: Backdoor At The End Of The ICMP Tunnel PingBack |
| 2020-04-10
⋅
Trustwave
⋅
An In-depth Look at MailTo Ransomware, Part Three of Three Mailto |
| 2020-04-08
⋅
Trustwave
⋅
An In-depth Look at MailTo Ransomware, Part Two of Three Mailto |
| 2020-03-31
⋅
Trustwave
⋅
An In-depth Look at MailTo Ransomware, Part One of Three Mailto |
| 2017-11-17
⋅
LloydLabs
⋅
[Part 1] - Analysing the New Linux/AES.DDoS IoT Malware MrBlack |
| 2007-04-03
⋅
USENIX
⋅
A Case Study of the Rustock Rootkit and Spam Bot Rustock |