Click here to download all references as Bib-File.•
| 2025-12-10
⋅
SpyCloud
⋅
Analyzing the Impact of the Operation Endgame Takedown on Rhadamanthys & the MaaS Ecosystem Rhadamanthys |
| 2025-10-13
⋅
SpyCloud
⋅
More Than Meets the YY: Analyzing the YYlaiyu PhaaS Panel |
| 2025-10-01
⋅
SpyCloud
⋅
Bifrost Burned: Dissecting Asgard Protector’s Defenses Lumma Stealer |
| 2025-07-01
⋅
SpyCloud
⋅
State Secrets for Sale: More Leaks from the Chinese Hack-for-Hire Industry |
| 2025-04-16
⋅
SpyCloud
⋅
Exposed Credentials & Ransomware Operations: Using LLMs to Digest 200K Messages from the Black Basta Chats Black Basta Black Basta |
| 2025-03-25
⋅
SpyCloud
⋅
On the Hunt for Ghost(Socks) GhostSocks |
| 2024-12-19
⋅
SpyCloud
⋅
LummaC2 Revisited: What’s Making this Stealer Stealthier and More Lethal GhostSocks Lumma Stealer |
| 2024-10-18
⋅
SpyCloud
⋅
A Deep Dive Into the Intricate Chinese Cybercrime Ecosystem |
| 2024-09-06
⋅
SpyCloud
⋅
The Curious Case of an Open Source Stealer: Phemedrone Phemedrone Stealer |
| 2024-06-03
⋅
SpyCloud
⋅
Reversing Atomic macOS Stealer: Binaries, Backdoors & Browser Theft AMOS |
| 2024-02-26
⋅
SpyCloud
⋅
“Pantsless Data”: Decoding Chinese Cybercrime TTPs |