Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-05-20Palo Alto Networks Unit 42Ruchna Nigam
@online{nigam:20220520:threat:b0d781e, author = {Ruchna Nigam}, title = {{Threat Brief: VMware Vulnerabilities Exploited in the Wild (CVE-2022-22954 and Others)}}, date = {2022-05-20}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/cve-2022-22954-vmware-vulnerabilities/}, language = {English}, urldate = {2023-08-28} } Threat Brief: VMware Vulnerabilities Exploited in the Wild (CVE-2022-22954 and Others)
Bashlite Mirai PerlBot
2021-08-24Palo Alto Networks Unit 42Ruchna Nigam, Doel Santos
@online{nigam:20210824:ransomware:dfd3e4b, author = {Ruchna Nigam and Doel Santos}, title = {{Ransomware Groups to Watch: Emerging Threats}}, date = {2021-08-24}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/emerging-ransomware-groups/}, language = {English}, urldate = {2021-08-24} } Ransomware Groups to Watch: Emerging Threats
HelloKitty AvosLocker HelloKitty Hive LockBit
2021-08-10paloalto Netoworks: Unit42Ruchna Nigam, Haozhe Zhang, Zhibin Zhang
@online{nigam:20210810:new:ee88c46, author = {Ruchna Nigam and Haozhe Zhang and Zhibin Zhang}, title = {{New eCh0raix Ransomware Variant Targets QNAP and Synology Network-Attached Storage Devices}}, date = {2021-08-10}, organization = {paloalto Netoworks: Unit42}, url = {https://unit42.paloaltonetworks.com/ech0raix-ransomware-soho/}, language = {English}, urldate = {2021-08-20} } New eCh0raix Ransomware Variant Targets QNAP and Synology Network-Attached Storage Devices
QNAPCrypt
2021-03-15Palo Alto Networks Unit 42Vaibhav Singhal, Ruchna Nigam, Zhibin Zhang, Asher Davila
@online{singhal:20210315:new:d276fac, author = {Vaibhav Singhal and Ruchna Nigam and Zhibin Zhang and Asher Davila}, title = {{New Mirai Variant Targeting New IoT Vulnerabilities, Including in Network Security Devices}}, date = {2021-03-15}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/}, language = {English}, urldate = {2021-03-22} } New Mirai Variant Targeting New IoT Vulnerabilities, Including in Network Security Devices
Mirai
2020-09-03Palo Alto Networks Unit 42Haozhe Zhang, Qi Deng, Zhibin Zhang, Ruchna Nigam
@online{zhang:20200903:exploits:08e8287, author = {Haozhe Zhang and Qi Deng and Zhibin Zhang and Ruchna Nigam}, title = {{Exploits in the Wild for vBulletin Pre-Auth RCE Vulnerability CVE-2020-17496}}, date = {2020-09-03}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/cve-2020-17496/}, language = {English}, urldate = {2023-08-28} } Exploits in the Wild for vBulletin Pre-Auth RCE Vulnerability CVE-2020-17496
Mirai PerlBot
2020-05-14paloalto Networks Unit 42Ruchna Nigam
@online{nigam:20200514:mirai:65d9d83, author = {Ruchna Nigam}, title = {{Mirai and Hoaxcalls Botnets Target Legacy Symantec Web Gateways}}, date = {2020-05-14}, organization = {paloalto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/hoaxcalls-mirai-target-legacy-symantec-web-gateways/}, language = {English}, urldate = {2020-05-18} } Mirai and Hoaxcalls Botnets Target Legacy Symantec Web Gateways
Bashlite Mirai
2020-04-03Palo Alto Networks Unit 42Ken Hsu, Haozhe Zhang, Zhibin Zhang, Ruchna Nigam
@online{hsu:20200403:grandstream:9d7d8a0, author = {Ken Hsu and Haozhe Zhang and Zhibin Zhang and Ruchna Nigam}, title = {{Grandstream and DrayTek Devices Exploited to Power New Hoaxcalls DDoS Botnet}}, date = {2020-04-03}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/new-hoaxcalls-ddos-botnet/}, language = {English}, urldate = {2023-08-28} } Grandstream and DrayTek Devices Exploited to Power New Hoaxcalls DDoS Botnet
Bashlite
2020-03-19Palo Alto Networks Unit 42Ken Hsu, Zhibin Zhang, Ruchna Nigam
@online{hsu:20200319:new:f5530d2, author = {Ken Hsu and Zhibin Zhang and Ruchna Nigam}, title = {{New Mirai Variant Targets Zyxel Network-Attached Storage Devices}}, date = {2020-03-19}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/new-mirai-variant-mukashi/}, language = {English}, urldate = {2023-08-28} } New Mirai Variant Targets Zyxel Network-Attached Storage Devices
Mirai
2019-12-13Palo Alto Networks Unit 42Ruchna Nigam
@online{nigam:20191213:mirai:ac58c7e, author = {Ruchna Nigam}, title = {{Mirai Variant ECHOBOT Resurfaces with 13 Previously Unexploited Vulnerabilities}}, date = {2019-12-13}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/mirai-variant-echobot-resurfaces-with-13-previously-unexploited-vulnerabilities/}, language = {English}, urldate = {2023-08-28} } Mirai Variant ECHOBOT Resurfaces with 13 Previously Unexploited Vulnerabilities
Echobot Mirai
2019-06-12Palo Alto Networks Unit 42Ruchna Nigam
@online{nigam:20190612:hide:fb1d18e, author = {Ruchna Nigam}, title = {{Hide ‘N Seek Botnet Updates Arsenal with Exploits Against Nexus Repository Manager & ThinkPHP}}, date = {2019-06-12}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/hide-n-seek-botnet-updates-arsenal-with-exploits-against-nexus-repository-manager-thinkphp/}, language = {English}, urldate = {2023-08-28} } Hide ‘N Seek Botnet Updates Arsenal with Exploits Against Nexus Repository Manager & ThinkPHP
Hide and Seek
2019-06-06Palo Alto Networks Unit 42Ruchna Nigam
@online{nigam:20190606:new:916134e, author = {Ruchna Nigam}, title = {{New Mirai Variant Adds 8 New Exploits, Targets Additional IoT Devices}}, date = {2019-06-06}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/new-mirai-variant-adds-8-new-exploits-targets-additional-iot-devices/}, language = {English}, urldate = {2020-03-09} } New Mirai Variant Adds 8 New Exploits, Targets Additional IoT Devices
Echobot Mirai
2019-04-08Palo Alto Networks Unit 42Ruchna Nigam
@online{nigam:20190408:mirai:b25b562, author = {Ruchna Nigam}, title = {{Mirai Compiled for New Processors Surfaces in the Wild}}, date = {2019-04-08}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/mirai-compiled-for-new-processor-surfaces/}, language = {English}, urldate = {2019-11-26} } Mirai Compiled for New Processors Surfaces in the Wild
Mirai
2019-03-18Palo Alto Networks Unit 42Ruchna Nigam
@online{nigam:20190318:new:fba8b9b, author = {Ruchna Nigam}, title = {{New Mirai Variant Targets Enterprise Wireless Presentation & Display Systems}}, date = {2019-03-18}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/}, language = {English}, urldate = {2023-08-28} } New Mirai Variant Targets Enterprise Wireless Presentation & Display Systems
Mirai
2018-09-09Palo Alto Networks Unit 42Ruchna Nigam
@online{nigam:20180909:multiexploit:c3960d3, author = {Ruchna Nigam}, title = {{Multi-exploit IoT/Linux Botnets Mirai and Gafgyt Target Apache Struts, SonicWall}}, date = {2018-09-09}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/}, language = {English}, urldate = {2023-08-28} } Multi-exploit IoT/Linux Botnets Mirai and Gafgyt Target Apache Struts, SonicWall
Bashlite Mirai
2018-07-20Palo Alto Networks Unit 42Ruchna Nigam
@online{nigam:20180720:unit:e044686, author = {Ruchna Nigam}, title = {{Unit 42 Finds New Mirai and Gafgyt IoT/Linux Botnet Campaigns}}, date = {2018-07-20}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2018/07/unit42-finds-new-mirai-gafgyt-iotlinux-botnet-campaigns/}, language = {English}, urldate = {2019-12-20} } Unit 42 Finds New Mirai and Gafgyt IoT/Linux Botnet Campaigns
Hakai Mirai
2018-04-05Palo Alto Networks Unit 42Ruchna Nigam
@online{nigam:20180405:reaper:d4da0f8, author = {Ruchna Nigam}, title = {{Reaper Group’s Updated Mobile Arsenal}}, date = {2018-04-05}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2018/04/unit42-reaper-groups-updated-mobile-arsenal/}, language = {English}, urldate = {2019-12-20} } Reaper Group’s Updated Mobile Arsenal
KevDroid
2018-03-20Palo Alto Networks Unit 42Ruchna Nigam, Kyle Wilhoit
@online{nigam:20180320:telerat:b8d1aa5, author = {Ruchna Nigam and Kyle Wilhoit}, title = {{TeleRAT: Another Android Trojan Leveraging Telegram’s Bot API to Target Iranian Users}}, date = {2018-03-20}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/}, language = {English}, urldate = {2019-12-20} } TeleRAT: Another Android Trojan Leveraging Telegram’s Bot API to Target Iranian Users
IRRat TeleRAT
2016-04-05FortiGuard LabsRuchna Nigam
@online{nigam:20160405:scada:c3688b0, author = {Ruchna Nigam}, title = {{SCADA Security Report 2016}}, date = {2016-04-05}, organization = {FortiGuard Labs}, url = {https://www.fortinet.com/blog/threat-research/scada-security-report-2016}, language = {English}, urldate = {2023-08-29} } SCADA Security Report 2016
2016-03-31FortiGuard LabsRuchna Nigam
@online{nigam:20160331:stored:a24df28, author = {Ruchna Nigam}, title = {{Stored XSS Vulnerabilites on Foscam}}, date = {2016-03-31}, organization = {FortiGuard Labs}, url = {https://www.fortinet.com/blog/threat-research/stored-xss-vulnerabilites-on-foscam-3}, language = {English}, urldate = {2023-08-29} } Stored XSS Vulnerabilites on Foscam
2016-01-22FortiGuard LabsRuchna Nigam
@online{nigam:20160122:cve20154400:25cc9f4, author = {Ruchna Nigam}, title = {{CVE-2015-4400 : Backdoorbot, Network Configuration Leak on a Connected Doorbell}}, date = {2016-01-22}, organization = {FortiGuard Labs}, url = {https://www.fortinet.com/blog/threat-research/cve-2015-4400-backdoorbot-network-configuration-leak-on-a-connected-doorbell}, language = {English}, urldate = {2023-08-29} } CVE-2015-4400 : Backdoorbot, Network Configuration Leak on a Connected Doorbell