Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-01-26ComaeMatt Suiche
@online{suiche:20210126:pandorabox:0fc91d0, author = {Matt Suiche}, title = {{PANDORABOX - North Koreans target security researchers}}, date = {2021-01-26}, organization = {Comae}, url = {https://www.comae.com/posts/pandorabox-north-koreans-target-security-researchers/}, language = {English}, urldate = {2021-01-27} } PANDORABOX - North Koreans target security researchers
ComeBacker
2020-12-25ComaeMatt Suiche
@online{suiche:20201225:sunburst:4169084, author = {Matt Suiche}, title = {{SUNBURST & Memory Analysis}}, date = {2020-12-25}, organization = {Comae}, url = {https://www.comae.com/posts/sunburst-memory-analysis/}, language = {English}, urldate = {2020-12-26} } SUNBURST & Memory Analysis
SUNBURST
2020-07-21YouTube ( OPCDE with Matt Suiche)Mohamad Mokbel
@online{mokbel:20200721:vopcde:26d48d0, author = {Mohamad Mokbel}, title = {{vOPCDE #9 - A Journey into Malware HTTP Communication Channels Spectacles (Mohamad Mokbel)}}, date = {2020-07-21}, organization = {YouTube ( OPCDE with Matt Suiche)}, url = {https://www.youtube.com/watch?v=FttiysUZmDw}, language = {English}, urldate = {2021-10-24} } vOPCDE #9 - A Journey into Malware HTTP Communication Channels Spectacles (Mohamad Mokbel)
Alureon Aytoke Cobra Carbon System CROSSWALK danbot ProtonBot Silence
2020-03-13ComaeMatt Suiche
@online{suiche:20200313:yet:d14d3a8, author = {Matt Suiche}, title = {{Yet Another Active Email Campaign With Malicious Excel Files Identified}}, date = {2020-03-13}, organization = {Comae}, url = {https://web.archive.org/web/20200929145931/https://www.comae.com/posts/2020-03-13_yet-another-active-email-campaign-with-malicious-excel-files-identified/}, language = {English}, urldate = {2021-04-06} } Yet Another Active Email Campaign With Malicious Excel Files Identified
Zloader
2020-02-22ComaeMatt Suiche
@online{suiche:20200222:active:81a954b, author = {Matt Suiche}, title = {{Active Email Campaign Identified With Malicious Excel Files}}, date = {2020-02-22}, organization = {Comae}, url = {https://blog.comae.io/active-email-campaign-identified-with-malicious-excel-files-174bbde91fc1}, language = {English}, urldate = {2020-06-16} } Active Email Campaign Identified With Malicious Excel Files
2017-06-28ComaeMatt Suiche
@online{suiche:20170628:petya2017:b147c0a, author = {Matt Suiche}, title = {{Petya.2017 is a wiper not a ransomware}}, date = {2017-06-28}, organization = {Comae}, url = {https://blog.comae.io/petya-2017-is-a-wiper-not-a-ransomware-9ea1d8961d3b}, language = {English}, urldate = {2020-01-06} } Petya.2017 is a wiper not a ransomware
2017-05-19ComaeMatt Suiche
@online{suiche:20170519:wannacry:81703ac, author = {Matt Suiche}, title = {{WannaCry — Decrypting files with WanaKiwi + Demos}}, date = {2017-05-19}, organization = {Comae}, url = {https://blog.comae.io/wannacry-decrypting-files-with-wanakiwi-demo-86bafb81112d}, language = {English}, urldate = {2019-10-25} } WannaCry — Decrypting files with WanaKiwi + Demos
WannaCryptor
2017-05-14ComaeMatt Suiche
@online{suiche:20170514:wannacry:b2c62ca, author = {Matt Suiche}, title = {{WannaCry — New Variants Detected!}}, date = {2017-05-14}, organization = {Comae}, url = {https://blog.comae.io/wannacry-new-variants-detected-b8908fefea7e}, language = {English}, urldate = {2020-01-08} } WannaCry — New Variants Detected!
WannaCryptor
2017-05-12ComaeMatt Suiche
@online{suiche:20170512:wannacry:f79fed5, author = {Matt Suiche}, title = {{WannaCry — The largest ransom-ware infection in History}}, date = {2017-05-12}, organization = {Comae}, url = {https://blog.comae.io/wannacry-the-largest-ransom-ware-infection-in-history-f37da8e30a58}, language = {English}, urldate = {2020-01-06} } WannaCry — The largest ransom-ware infection in History
WannaCryptor