Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-11-16MalwarebytesThreat Intelligence Team
@online{team:20201116:malsmoke:0cddf67, author = {Threat Intelligence Team}, title = {{Malsmoke operators abandon exploit kits in favor of social engineering scheme}}, date = {2020-11-16}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2020/11/malsmoke-operators-abandon-exploit-kits-in-favor-of-social-engineering-scheme/}, language = {English}, urldate = {2020-11-18} } Malsmoke operators abandon exploit kits in favor of social engineering scheme
Zloader
2020-10-14MalwarebytesThreat Intelligence Team
@online{team:20201014:silent:8149a1d, author = {Threat Intelligence Team}, title = {{Silent Librarian APT right on schedule for 20/21 academic year}}, date = {2020-10-14}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/malwarebytes-news/2020/10/silent-librarian-apt-phishing-attack/}, language = {English}, urldate = {2020-10-23} } Silent Librarian APT right on schedule for 20/21 academic year
2020-10-12MicrosoftMicrosoft 365 Defender Threat Intelligence Team
@online{team:20201012:trickbot:e4f086f, author = {Microsoft 365 Defender Threat Intelligence Team}, title = {{Trickbot disrupted}}, date = {2020-10-12}, organization = {Microsoft}, url = {https://www.microsoft.com/security/blog/2020/10/12/trickbot-disrupted/}, language = {English}, urldate = {2020-10-12} } Trickbot disrupted
TrickBot
2020-10-08MalwarebytesThreat Intelligence Team
@online{team:20201008:credit:5e7e0b3, author = {Threat Intelligence Team}, title = {{Credit card skimmer targets virtual conference platform}}, date = {2020-10-08}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/malwarebytes-news/2020/10/credit-card-skimmer-targets-virtual-conference-platform/}, language = {English}, urldate = {2020-10-12} } Credit card skimmer targets virtual conference platform
2020-09-09MalwarebytesThreat Intelligence Team
@online{team:20200909:malvertising:ed1c3b8, author = {Threat Intelligence Team}, title = {{Malvertising campaigns come back in full swing}}, date = {2020-09-09}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/social-engineering/2020/09/malvertising-campaigns-come-back-in-full-swing/}, language = {English}, urldate = {2020-09-15} } Malvertising campaigns come back in full swing
Raccoon SmokeLoader
2020-08-18F-SecureF-Secure Threat Intelligence Team
@techreport{team:20200818:lazarus:9be8b2a, author = {F-Secure Threat Intelligence Team}, title = {{Lazarus Group Campaign Targeting the Cryptocurrency Vertical}}, date = {2020-08-18}, institution = {F-Secure}, url = {https://labs.f-secure.com/assets/BlogFiles/f-secureLABS-tlp-white-lazarus-threat-intel-report2.pdf}, language = {English}, urldate = {2020-08-31} } Lazarus Group Campaign Targeting the Cryptocurrency Vertical
2020-06-09MalwarebytesThreat Intelligence Team
@online{team:20200609:honda:a44da80, author = {Threat Intelligence Team}, title = {{Honda and Enel impacted by cyber attack suspected to be ransomware}}, date = {2020-06-09}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2020/06/honda-and-enel-impacted-by-cyber-attack-suspected-to-be-ransomware/}, language = {English}, urldate = {2020-06-10} } Honda and Enel impacted by cyber attack suspected to be ransomware
Snake Ransomware
2020-03-23MalwarebytesThreat Intelligence Team
@online{team:20200323:fake:f3a2cbc, author = {Threat Intelligence Team}, title = {{Fake “Corona Antivirus” distributes BlackNET remote administration tool}}, date = {2020-03-23}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2020/03/fake-corona-antivirus-distributes-blacknet-remote-administration-tool/}, language = {English}, urldate = {2020-07-13} } Fake “Corona Antivirus” distributes BlackNET remote administration tool
BlackNET RAT
2020-03-19Twitter (@MBThreatIntel)Malwarebytes Threat Intelligence Team
@online{team:20200319:poulight:b94731b, author = {Malwarebytes Threat Intelligence Team}, title = {{Tweet on Poulight Stealer}}, date = {2020-03-19}, organization = {Twitter (@MBThreatIntel)}, url = {https://twitter.com/MBThreatIntel/status/1240389621638402049?s=20}, language = {English}, urldate = {2020-03-25} } Tweet on Poulight Stealer
Poulight Stealer
2019-12-03MalwarebytesThreat Intelligence Team
@online{team:20191203:new:39b59e1, author = {Threat Intelligence Team}, title = {{New version of IcedID Trojan uses steganographic payloads}}, date = {2019-12-03}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2019/12/new-version-of-icedid-trojan-uses-steganographic-payloads/}, language = {English}, urldate = {2019-12-24} } New version of IcedID Trojan uses steganographic payloads
IcedID
2019-09-16MalwarebytesThreat Intelligence Team
@online{team:20190916:emotet:9c6c8f3, author = {Threat Intelligence Team}, title = {{Emotet is back: botnet springs back to life with new spam campaign}}, date = {2019-09-16}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/botnets/2019/09/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign/}, language = {English}, urldate = {2019-12-20} } Emotet is back: botnet springs back to life with new spam campaign
Emotet
2019-02-16AvastThreat Intelligence Team
@online{team:20190216:spoofing:eeffd53, author = {Threat Intelligence Team}, title = {{Spoofing in the reeds with Rietspoof}}, date = {2019-02-16}, organization = {Avast}, url = {https://blog.avast.com/rietspoof-malware-increases-activity}, language = {English}, urldate = {2020-01-10} } Spoofing in the reeds with Rietspoof
Rietspoof
2018-09-27AvastThreat Intelligence Team
@online{team:20180927:torii:186f7d7, author = {Threat Intelligence Team}, title = {{Torii botnet - Not another Mirai variant}}, date = {2018-09-27}, organization = {Avast}, url = {https://blog.avast.com/new-torii-botnet-threat-research}, language = {English}, urldate = {2020-01-13} } Torii botnet - Not another Mirai variant
Torii
2018-03-08AvastThreat Intelligence Team
@online{team:20180308:new:f825c46, author = {Threat Intelligence Team}, title = {{New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities}}, date = {2018-03-08}, organization = {Avast}, url = {https://blog.avast.com/new-investigations-in-ccleaner-incident-point-to-a-possible-third-stage-that-had-keylogger-capacities}, language = {English}, urldate = {2020-01-08} } New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities
CCleaner Backdoor
2018-02-21AvastThreat Intelligence Team
@online{team:20180221:avast:3991fd0, author = {Threat Intelligence Team}, title = {{Avast tracks down Tempting Cedar Spyware}}, date = {2018-02-21}, organization = {Avast}, url = {https://blog.avast.com/avast-tracks-down-tempting-cedar-spyware}, language = {English}, urldate = {2020-01-08} } Avast tracks down Tempting Cedar Spyware
TemptingCedar Spyware
2017-09-25AvastThreat Intelligence Team
@online{team:20170925:additional:d65b214, author = {Threat Intelligence Team}, title = {{Additional information regarding the recent CCleaner APT security incident}}, date = {2017-09-25}, organization = {Avast}, url = {https://blog.avast.com/additional-information-regarding-the-recent-ccleaner-apt-security-incident}, language = {English}, urldate = {2020-01-10} } Additional information regarding the recent CCleaner APT security incident
CCleaner Backdoor
2017-09-21AvastThreat Intelligence Team
@online{team:20170921:avast:c2efbfe, author = {Threat Intelligence Team}, title = {{Avast Threat Labs analysis of CCleaner incident}}, date = {2017-09-21}, organization = {Avast}, url = {https://blog.avast.com/avast-threat-labs-analysis-of-ccleaner-incident}, language = {English}, urldate = {2020-01-08} } Avast Threat Labs analysis of CCleaner incident
CCleaner Backdoor
2017-07-17MalwarebytesThreat Intelligence Team
@online{team:20170717:its:4b94b0b, author = {Threat Intelligence Team}, title = {{It’s baaaack: Public cyber enemy Emotet has returned}}, date = {2017-07-17}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/trojans/2020/07/long-dreaded-emotet-has-returned/}, language = {English}, urldate = {2020-07-17} } It’s baaaack: Public cyber enemy Emotet has returned
Emotet
2016-04-06AvastThreat Intelligence Team
@online{team:20160406:andromeda:4b7f3e6, author = {Threat Intelligence Team}, title = {{Andromeda under the microscope}}, date = {2016-04-06}, organization = {Avast}, url = {https://blog.avast.com/andromeda-under-the-microscope}, language = {English}, urldate = {2020-01-13} } Andromeda under the microscope
Andromeda
2013-05-20AvastThreat Intelligence Team
@online{team:20130520:lockscreen:22b0503, author = {Threat Intelligence Team}, title = {{Lockscreen Win32:Lyposit displayed as a fake MacOs app}}, date = {2013-05-20}, organization = {Avast}, url = {https://blog.avast.com/2013/05/20/lockscreen-win32lyposit-displayed-as-a-fake-macos-app/}, language = {English}, urldate = {2020-01-10} } Lockscreen Win32:Lyposit displayed as a fake MacOs app
Lyposit