Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-04-16SpyCloudAurora Johnson, Keegan Keplinger
Exposed Credentials & Ransomware Operations: Using LLMs to Digest 200K Messages from the Black Basta Chats
Black Basta Black Basta
2025-03-25SpyCloudJames
On the Hunt for Ghost(Socks)
GhostSocks
2024-12-19SpyCloudJames
LummaC2 Revisited: What’s Making this Stealer Stealthier and More Lethal
GhostSocks Lumma Stealer
2024-10-18SpyCloudKyla Cardona
A Deep Dive Into the Intricate Chinese Cybercrime Ecosystem
2024-09-06SpyCloudJames
The Curious Case of an Open Source Stealer: Phemedrone
Phemedrone Stealer
2024-06-03SpyCloudJames
Reversing Atomic macOS Stealer: Binaries, Backdoors & Browser Theft
AMOS
2024-02-26SpyCloudAshley Allocca, Kyla Cardona
“Pantsless Data”: Decoding Chinese Cybercrime TTPs