Click here to download all references as Bib-File.
|2022-08-04 ⋅ PTSecurity ⋅ |
Flying in the clouds: APT31 renews its attacks on Russian companies through cloud storage
|2021-09-30 ⋅ PTSecurity ⋅ |
Masters of Mimicry: new APT group ChamelGang and its arsenal
|2021-04-27 ⋅ Positive Technologies ⋅ |
Lazarus Group Recruitment: Threat Hunters vs Head Hunters
|2021-01-14 ⋅ PTSecurity ⋅ |
Higaisa or Winnti? APT41 backdoors, old and new
Cobalt Strike CROSSWALK FunnySwitch PlugX ShadowPad
|2020-06-16 ⋅ PTSecurity ⋅ |
Cobalt: tactics and tools update
|2020-06-04 ⋅ PTSecurity ⋅ |
COVID-19 and New Year greetings: an investigation into the tools and methods used by the Higaisa group
|2020-05-24 ⋅ Positive Technologies ⋅ |
Operation TA505: network infrastructure. Part 3.
AndroMut Buhtrap SmokeLoader
|2020-05-22 ⋅ Positive Technologies ⋅ |
Operation TA505: investigating the ServHelper backdoor with NetSupport RAT. Part 2.
NetSupportManager RAT ServHelper
|2020-05-20 ⋅ PTSecurity ⋅ |
Operation TA505: how we analyzed new tools from the creators of the Dridex trojan, Locky ransomware, and Neutrino botnet
|2019-11-11 ⋅ PTSecurity ⋅ |
Operation TA505, part four. Twins