Click here to download all references as Bib-File.
2022-01-13 ⋅ Trustwave ⋅ Decrypting Qakbot’s Encrypted Registry Keys QakBot |
2021-10-15 ⋅ Trustwave ⋅ BlackByte Ransomware – Pt. 1 In-depth Analysis |
2021-10-15 ⋅ Trustwave ⋅ BlackByte Ransomware – Pt 2. Code Obfuscation Analysis |
2021-07-03 ⋅ Twitter (@LloydLabs) ⋅ Twitter Thread on Revil sideloading DLL used in Kaseya attack REvil |
2021-05-04 ⋅ Trustwave ⋅ Pingback: Backdoor At The End Of The ICMP Tunnel PingBack |
2020-04-10 ⋅ Trustwave ⋅ An In-depth Look at MailTo Ransomware, Part Three of Three Mailto |
2020-04-08 ⋅ Trustwave ⋅ An In-depth Look at MailTo Ransomware, Part Two of Three Mailto |
2020-03-31 ⋅ Trustwave ⋅ An In-depth Look at MailTo Ransomware, Part One of Three Mailto |
2017-11-17 ⋅ LloydLabs ⋅ [Part 1] - Analysing the New Linux/AES.DDoS IoT Malware Dofloo |
2007-04-03 ⋅ USENIX ⋅ A Case Study of the Rustock Rootkit and Spam Bot Rustock |