Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-01-19Team CymruS2 Research Team
@online{team:20230119:darth:4a19fc1, author = {S2 Research Team}, title = {{Darth Vidar: The Dark Side of Evolving Threat Infrastructure}}, date = {2023-01-19}, organization = {Team Cymru}, url = {https://www.team-cymru.com/post/darth-vidar-the-dark-side-of-evolving-threat-infrastructure}, language = {English}, urldate = {2023-01-19} } Darth Vidar: The Dark Side of Evolving Threat Infrastructure
Vidar
2022-12-21Team CymruS2 Research Team
@online{team:20221221:inside:8298d24, author = {S2 Research Team}, title = {{Inside the IcedID BackConnect Protocol}}, date = {2022-12-21}, organization = {Team Cymru}, url = {https://www.team-cymru.com/post/inside-the-icedid-backconnect-protocol}, language = {English}, urldate = {2022-12-24} } Inside the IcedID BackConnect Protocol
IcedID
2022-10-07Team CymruS2 Research Team
@online{team:20221007:visualizza:0ed3fe8, author = {S2 Research Team}, title = {{A Visualizza into Recent IcedID Campaigns: Reconstructing Threat Actor Metrics with Pure Signalâ„¢ Recon}}, date = {2022-10-07}, organization = {Team Cymru}, url = {https://www.team-cymru.com/post/a-visualizza-into-recent-icedid-campaigns}, language = {English}, urldate = {2022-10-10} } A Visualizza into Recent IcedID Campaigns: Reconstructing Threat Actor Metrics with Pure Signalâ„¢ Recon
IcedID PhotoLoader
2022-09-29Team CymruS2 Research Team
@online{team:20220929:seychelles:2d1a3c1, author = {S2 Research Team}, title = {{Seychelles, Seychelles, on the C(2) Shore: An overview of a bulletproof hosting provider named ELITETEAM.}}, date = {2022-09-29}, organization = {Team Cymru}, url = {https://www.team-cymru.com/post/seychelles-seychelles-on-the-c-2-shore}, language = {English}, urldate = {2022-10-10} } Seychelles, Seychelles, on the C(2) Shore: An overview of a bulletproof hosting provider named ELITETEAM.
Amadey Raccoon RedLine Stealer SmokeLoader STOP
2022-09-05Team CymruS2 Research Team
@online{team:20220905:mythic:bd40e35, author = {S2 Research Team}, title = {{Mythic Case Study: Assessing Common Offensive Security Tools}}, date = {2022-09-05}, organization = {Team Cymru}, url = {https://www.team-cymru.com/post/mythic-case-study-assessing-common-offensive-security-tools}, language = {English}, urldate = {2022-09-13} } Mythic Case Study: Assessing Common Offensive Security Tools
2022-05-25Team CymruS2 Research Team
@online{team:20220525:bablosoft:90f50c4, author = {S2 Research Team}, title = {{Bablosoft; Lowering the Barrier of Entry for Malicious Actors}}, date = {2022-05-25}, organization = {Team Cymru}, url = {https://team-cymru.com/blog/2022/05/25/bablosoft-lowering-the-barrier-of-entry-for-malicious-actors/}, language = {English}, urldate = {2022-05-29} } Bablosoft; Lowering the Barrier of Entry for Malicious Actors
BlackGuard BumbleBee RedLine Stealer