Click here to download all references as Bib-File.
2023-05-17 ⋅ Medium (@DCSO_CyTec) ⋅ Andariel’s “Jupiter” malware and the case of the curious C2 Jupiter |
2023-05-14 ⋅ Medium ⋅ Silent Echoes: The Hidden Dialogue among Malware Entities — Spotlight on AMOS InfoStealer AMOS Aurora Stealer TitanStealer |
2023-05-09 ⋅ Medium walmartglobaltech ⋅ MetaStealer string decryption and DGA overview MetaStealer |
2023-04-19 ⋅ Medium (@simone.kraus) ⋅ Rorschach Ransomware Analysis with Attack Flow Rorschach Ransomware |
2023-04-13 ⋅ Medium Invictus Incident Response ⋅ Ransomware in the cloud |
2023-04-05 ⋅ Medium Ilandu ⋅ PortDoor - APT Backdoor analysis ACBackdoor 8.t Dropper PortDoor |
2023-03-23 ⋅ Medium s2wlab ⋅ Scarcruft Bolsters Arsenal for targeting individual Android devices RambleOn RokRAT |
2023-03-20 ⋅ Medium s2wlab ⋅ Detailed Analysis of Cryptocurrency Phishing Through Famous YouTube Channel Hacking |
2023-03-17 ⋅ Medium s2wlab ⋅ Kimsuky group appears to be exploiting OneNote like the cybercrime group |
2023-03-10 ⋅ Medium walmartglobaltech ⋅ From Royal With Love Cobalt Strike Conti PLAY Royal Ransom Somnia |
2023-02-27 ⋅ Medium s2wlab ⋅ Lumma Stealer targets YouTubers via Spear-phishing Email Lumma Stealer |
2023-02-26 ⋅ Medium Ilandu ⋅ Emotet Campaign Emotet |
2023-02-24 ⋅ Medium walmartglobaltech ⋅ Qbot testing malvertising campaigns? QakBot |
2023-01-16 ⋅ Medium elis531989 ⋅ Dancing With Shellcodes: Analyzing Rhadamanthys Stealer Rhadamanthys |
2022-11-16 ⋅ Medium (@DCSO_CyTec) ⋅ HZ RAT goes China HZ RAT |
2022-10-25 ⋅ Medium walmartglobaltech ⋅ Brute Ratel Config Decoding update Brute Ratel C4 |
2022-10-24 ⋅ Medium CSIS Techblog ⋅ Chapter 1 — From Gozi to ISFB: The history of a mythical malware family. Gozi ISFB Snifula |
2022-10-24 ⋅ Medium s2wlab ⋅ Unveil the evolution of Kimsuky targeting Android devices with newly discovered mobile malware FastFire FastSpy |
2022-10-11 ⋅ Medium (@DCSO_CyTec) ⋅ Tracking down Maggie Maggie |
2022-10-04 ⋅ Medium (@DCSO_CyTec) ⋅ MSSQL, meet Maggie Maggie |