Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-02-06Perception PointIgal Lytzki
@online{lytzki:20230206:behind:0604cde, author = {Igal Lytzki}, title = {{Behind the Attack: Paradies Clipper Malware}}, date = {2023-02-06}, organization = {Perception Point}, url = {https://perception-point.io/blog/behind-the-attack-paradies-clipper-malware/}, language = {English}, urldate = {2023-02-09} } Behind the Attack: Paradies Clipper Malware
Paradies Clipper
2023-01-10Perception Point@0xToxin, Igal Lytzki
@online{0xtoxin:20230110:rebranded:84d3bbc, author = {@0xToxin and Igal Lytzki}, title = {{The Rebranded Crypter: ScrubCrypt}}, date = {2023-01-10}, organization = {Perception Point}, url = {https://perception-point.io/blog/the-rebranded-crypter-scrubcrypt/}, language = {English}, urldate = {2023-01-11} } The Rebranded Crypter: ScrubCrypt
ScrubCrypt
2022-09-29Perception PointIgal Lytzki
@online{lytzki:20220929:doenerium:06e117e, author = {Igal Lytzki}, title = {{Doenerium: It’s Not a Crime to Steal From Thieves}}, date = {2022-09-29}, organization = {Perception Point}, url = {https://perception-point.io/doenerium-malware/}, language = {English}, urldate = {2022-09-30} } Doenerium: It’s Not a Crime to Steal From Thieves
doenerium
2022-08-21Perception PointIgal Lytzki
@online{lytzki:20220821:behind:e6e884e, author = {Igal Lytzki}, title = {{Behind the Attack: Remcos RAT}}, date = {2022-08-21}, organization = {Perception Point}, url = {https://perception-point.io/behind-the-attack-remcos-rat/}, language = {English}, urldate = {2022-09-22} } Behind the Attack: Remcos RAT
Remcos
2022-04-07Perception PointIgal Lytzki
@online{lytzki:20220407:revenge:9f4c4e4, author = {Igal Lytzki}, title = {{Revenge RAT Malware is back: From Microsoft Excel macros to Remote Access Trojan}}, date = {2022-04-07}, organization = {Perception Point}, url = {https://perception-point.io/revenge-rat-back-from-microsoft-excel-macros/}, language = {English}, urldate = {2022-06-09} } Revenge RAT Malware is back: From Microsoft Excel macros to Remote Access Trojan
Revenge RAT
2021-06-20Perception PointOded Kalev
@online{kalev:20210620:dangerous:807860a, author = {Oded Kalev}, title = {{Dangerous Phishing Campaign for Harvesting Credentials using an HTML Attachment}}, date = {2021-06-20}, organization = {Perception Point}, url = {https://perception-point.io/dangerous-phishing-campaign-for-harvesting-credentials-using-an-html-attachment/}, language = {English}, urldate = {2021-06-24} } Dangerous Phishing Campaign for Harvesting Credentials using an HTML Attachment
2021-06-15Perception PointShai Golderman
@online{golderman:20210615:insights:d3fc7b6, author = {Shai Golderman}, title = {{Insights Into an Excel 4.0 Macro Attack using Qakbot Malware}}, date = {2021-06-15}, organization = {Perception Point}, url = {https://perception-point.io/insights-into-an-excel-4-0-macro-attack-using-qakbot-malware}, language = {English}, urldate = {2021-06-21} } Insights Into an Excel 4.0 Macro Attack using Qakbot Malware
QakBot