Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-04-20FireEyeJosh Fleischer, Chris DiGiamo, Alex Pennino
@online{fleischer:20210420:zeroday:0641c6a, author = {Josh Fleischer and Chris DiGiamo and Alex Pennino}, title = {{Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise}}, date = {2021-04-20}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2021/04/zero-day-exploits-in-sonicwall-email-security-lead-to-compromise.html}, language = {English}, urldate = {2021-04-28} } Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
2021-03-26SonicWallSonicWall CaptureLabs Threats Research Team
@online{team:20210326:chinas:d31ffa4, author = {SonicWall CaptureLabs Threats Research Team}, title = {{China’s “Winnti” Spyder Module}}, date = {2021-03-26}, organization = {SonicWall}, url = {https://securitynews.sonicwall.com/xmlpost/chinas-winnti-spyder-module/}, language = {English}, urldate = {2021-04-29} } China’s “Winnti” Spyder Module
Spyder Winnti
2021-02-01SonicWallSonicWall
@online{sonicwall:20210201:urgent:1b2f884, author = {SonicWall}, title = {{Urgent Security Notice: SonicWall Confirms SMA 100 Series 10. X Zero-Day Vulnerability}}, date = {2021-02-01}, organization = {SonicWall}, url = {https://www.sonicwall.com/support/product-notification/urgent-security-notice-sonicwall-confirms-sma-100-series-10-x-zero-day-vulnerability-feb-1-2-p-m-cst/210122173415410/}, language = {English}, urldate = {2021-02-02} } Urgent Security Notice: SonicWall Confirms SMA 100 Series 10. X Zero-Day Vulnerability
2021-01-31Twitter (@NCCGroupInfosec)NCCGroup
@online{nccgroup:20210131:itw:c033bfc, author = {NCCGroup}, title = {{Tweet on ITW exploitation of 0-day in SonicWall SMA 100 series}}, date = {2021-01-31}, organization = {Twitter (@NCCGroupInfosec)}, url = {https://twitter.com/NCCGroupInfosec/status/1355850304596680705}, language = {English}, urldate = {2021-02-02} } Tweet on ITW exploitation of 0-day in SonicWall SMA 100 series
2021-01-24Darren’s WebsiteDarren Martyn
@online{martyn:20210124:visualdoor:3e91780, author = {Darren Martyn}, title = {{VisualDoor: SonicWall SSL-VPN Exploit}}, date = {2021-01-24}, organization = {Darren’s Website}, url = {https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit/amp/?__twitter_impression=true}, language = {English}, urldate = {2021-01-25} } VisualDoor: SonicWall SSL-VPN Exploit
2020-01-09SonicWallSonicWall
@online{sonicwall:20200109:servhelper:3e6a00c, author = {SonicWall}, title = {{ServHelper 2.0: Enriched with bot capabilities and allow remote desktop access}}, date = {2020-01-09}, organization = {SonicWall}, url = {https://securitynews.sonicwall.com/xmlpost/servhelper-2-0-enriched-with-bot-capabilities-and-allow-remote-desktop-access/}, language = {English}, urldate = {2020-09-18} } ServHelper 2.0: Enriched with bot capabilities and allow remote desktop access
ServHelper
2019-12-13SonicWallSonicWall
@online{sonicwall:20191213:lalala:082f090, author = {SonicWall}, title = {{LALALA InfoStealer which comes with Batch and PowerShell scripting combo}}, date = {2019-12-13}, organization = {SonicWall}, url = {https://securitynews.sonicwall.com/xmlpost/lalala-infostealer-which-comes-with-batch-and-powershell-scripting-combo/}, language = {English}, urldate = {2020-05-29} } LALALA InfoStealer which comes with Batch and PowerShell scripting combo
LALALA Stealer
2018-09-21SonicWallSonicWall CaptureLabs Threats Research Team
@online{team:20180921:vigilante:ede26ef, author = {SonicWall CaptureLabs Threats Research Team}, title = {{VIGILANTE MALWARE REMOVES CRYPTOMINERS FROM THE INFECTED DEVICE}}, date = {2018-09-21}, organization = {SonicWall}, url = {https://securitynews.sonicwall.com/xmlpost/vigilante-malware-removes-cryptominers-from-the-infected-device/}, language = {English}, urldate = {2019-10-13} } VIGILANTE MALWARE REMOVES CRYPTOMINERS FROM THE INFECTED DEVICE
FBot
2015SonicWallSonicWall
@online{sonicwall:2015:laziok:5d02cc8, author = {SonicWall}, title = {{Laziok Malware Targets Energy Companies}}, date = {2015}, organization = {SonicWall}, url = {https://www.mysonicwall.com/sonicalert/searchresults.aspx?ev=article&id=802}, language = {English}, urldate = {2019-10-23} } Laziok Malware Targets Energy Companies
Laziok