Click here to download all references as Bib-File.•
| 2025-09-25
⋅
ESET Research
⋅
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit |
| 2025-09-25
⋅
Virus Bulletin
⋅
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit |
| 2022-09-30
⋅
Virus Bulletin
⋅
Lazarus & BYOVD: evil to the Windows core FudModule |