Click here to download all references as Bib-File.•
2023-03-28
⋅
ThreatMon
⋅
Chinotto Backdoor Technical Analysis of the APT Reaper’s Powerful Weapon Chinotto |
2023-03-20
⋅
ThreatMon
⋅
Cybergun: Technical Analysis of the Armageddon's Infostealer Pteranodon |
2023-02-16
⋅
ThreatMon
⋅
APT SideCopy Targeting Indian Government Entities - Analysis of the new version of ReverseRAT Unidentified 005 (Sidecopy) ReverseRAT |
2023-01-01
⋅
ThreatMon
⋅
APT41's Attack Chain: Exe-LolBins Leads to Powershell Backdoor with Telegram C2 |
2023-01-01
⋅
ThreatMon
⋅
APT Blind Eagles Malware Arsenal Technical Analysis LimeRAT |
2023-01-01
⋅
ThreatMon
⋅
The Rise of Dark Power: A Close Look at the Group and their Ransomware |
2023-01-01
⋅
ThreatMon
⋅
Zaraza Bot: The New Russian Credential Stealer |
2023-01-01
⋅
ThreatMon
⋅
Reverse Engineering RokRAT: A Closer Look at APT37’s Onedrive-Based Attack Vector RokRAT |
2023-01-01
⋅
ThreatMon
⋅
Threat Analysis: SharpPanda APT’s Attack Chain Targeting G20 Nations |
2023-01-01
⋅
ThreatMon
⋅
Technical Analysis of RDPCredentialStealer: Uncovering Malware Targeting RDP Credentials with API Hooking |
2023-01-01
⋅
ThreatMon
⋅
Unraveling the Complex Infection Chain: Analysis of the SideCopy APT's Attack Action RAT |
2023-01-01
⋅
ThreatMon
⋅
From Slides to Threats: Transparent Tribe’s New Attack on Indian Government Entities Using Malicious PPT |
2023-01-01
⋅
ThreatMon
⋅
Solving the Puzzle: Reversing the New Stealer Jigsaw Jigsaw |
2023-01-01
⋅
ThreatMon
⋅
Unmasking Stealer X1na: A Technical Analysis of the Latest Threat |
2023-01-01
⋅
ThreatMon
⋅
NestJS Stealer: Unraveling the Inner Workings of a New Cybersecurity Menace |
2023-01-01
⋅
ThreatMon
⋅
RAT Goes Phishing: Dissecting the Stealthy Techniques of REM Phishing RAT |
2023-01-01
⋅
ThreatMon
⋅
Chaos Unleashed: a Technical Analysis of a Novel Ransomware Chaos |
2023-01-01
⋅
ThreatMon
⋅
Python's Dark Side When Crafting a Wallet Stealer Becomes Disturbingly Effortless |
2023-01-01
⋅
ThreatMon
⋅
Stealing in Stealth: Investigating a Python-based Evasive Malware Exela |
2023-01-01
⋅
ThreatMon
⋅
Unraveling the Layers: Analysis of Kimsuky's Multi-Staged Cyberattack Kimsuky |
2023-01-01
⋅
ThreatMon
⋅
The Konni APT Chronicle: Tracing Their Intelligence-Driven Attack Chain Konni |
2023-01-01
⋅
ThreatMon
⋅
Serpent Stealer Unmasked: Threat Analysis and Countermeasures |
2023-01-01
⋅
ThreatMon
⋅
The Anatomy of a Sidecopy Attack: From RAR Exploits to AllaKore RAT AllaKore |