Click here to download all references as Bib-File.
2023-05-30 ⋅ Trend Micro ⋅ Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals ROMCOM RAT |
2022-11-08 ⋅ DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework DeimosC2 |
2022-04-26 ⋅ Trend Micro ⋅ How Cybercriminals Abuse Cloud Tunneling Services AsyncRAT Cobalt Strike DarkComet Meterpreter Nanocore RAT |
2022-03-17 ⋅ Trendmicro ⋅ Cyclops Blink Sets Sights on Asus Routers CyclopsBlink |
2022-03-17 ⋅ Trendmicro ⋅ Cyclops Blink Sets Sights on Asus Routers (Appendix) CyclopsBlink |
2022-01-20 ⋅ Trend Micro ⋅ Backing Your Backup Defending NAS Devices Against Evolving Threats QNAPCrypt QSnatch |
2021-06-08 ⋅ Trend Micro ⋅ Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them Nefilim |
2021-01-19 ⋅ Trend Micro ⋅ VPNFilter Two Years Later: Routers Still Compromised VPNFilter |
2017-08-24 ⋅ Trend Micro ⋅ Malicious Chrome Extensions Stealing Roblox In-Game Currency, Sending Cookies via Discord CukieGrab |
2016-09-14 ⋅ Trend Micro ⋅ BkSoD by Ransomware: HDDCryptor Uses Commercial Tools to Encrypt Network Shares and Lock HDDs Mamba |