Click here to download all references as Bib-File.•
2025-10-01
⋅
Chainanalysis
⋅
DPRK IT Workers: Inside North Korea’s Crypto Laundering Network |
2025-09-24
⋅
The Hacker News
⋅
Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike Cobalt Strike Leslieloader Pantegana SparkRAT Storm-2077 |
2025-09-22
⋅
EclecticIQ
⋅
ShinyHunters Calling: Financially Motivated Data Extortion Group Targeting Enterprise Cloud Applications |
2025-08-06
⋅
ANY.RUN
⋅
PyLangGhost RAT: Rising Stealer from Lazarus Group Striking Finance and Technology PylangGhost GolangGhost |
2025-07-04
⋅
The Hacker News
⋅
NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors NightEagle |
2025-06-21
⋅
⋅
Cert-UA
⋅
Cyberattacks UAC-0001 (APT28) in relation to public authorities using BEARDSHELL and COVENANT BEARDSHELL GRUNT SLIMAGENT |
2025-06-03
⋅
ANY.RUN
⋅
OtterCookie: Analysis of Lazarus Group Malware Targeting Finance and Tech Professionals BeaverTail OtterCookie InvisibleFerret |
2025-04-14
⋅
Trend Micro
⋅
BPFDoor’s Hidden Controller Used Against Asia, Middle East Targets BPFDoor Red Menshen |
2025-04-04
⋅
The Hacker News
⋅
OPSEC Failure Exposes Coquettte's Malware Campaigns on Bulletproof Hosting Servers Rugmi |
2025-04-02
⋅
ANALYST1
⋅
Inside BlackBasta: Actor Profiles, Extortion Tactics & Finances Black Basta Black Basta |
2025-03-28
⋅
cyble
⋅
TsarBot: A New Android Banking Trojan Targeting Over 750 Banking, Finance, and Cryptocurrency Applications TsarBot |
2025-03-15
⋅
Github (TheRavenFile)
⋅
IoCs for Anubis Backdoor Anubis Backdoor |
2025-03-11
⋅
The Hacker News
⋅
Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks AsyncRAT NjRAT Quasar RAT Remcos |
2025-03-06
⋅
⋅
Orange Cyberdefense
⋅
Dossier Bybit : Le plus gros hack de l’histoire de la finance |
2025-03-04
⋅
c/side
⋅
Thousands of websites hit by four backdoors in 3rd party JavaScript attack |
2025-02-27
⋅
Medium b.magnezi
⋅
NanoCore Malware Analysis Nanocore RAT |
2025-02-12
⋅
The Hacker News
⋅
North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack |
2025-01-21
⋅
Financial Security Institute
⋅
Follow the Clues - Everyday is lazarus.day |
2024-12-16
⋅
Gdata
⋅
New I2PRAT communicates via anonymous peer-to-peer network Unidentified 118 |
2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb |