Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-02-23ESET ResearchVladislav Hrčka
@online{hrka:20230223:winordll64:73e8cbf, author = {Vladislav Hrčka}, title = {{WinorDLL64: A backdoor from the vast Lazarus arsenal?}}, date = {2023-02-23}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2023/02/23/winordll64-backdoor-vast-lazarus-arsenal/}, language = {English}, urldate = {2023-02-27} } WinorDLL64: A backdoor from the vast Lazarus arsenal?
WinorDLL64
2022-09-14ESET ResearchVladislav Hrčka, Mathieu Tartare, Thibaut Passilly
@online{hrka:20220914:you:3850b85, author = {Vladislav Hrčka and Mathieu Tartare and Thibaut Passilly}, title = {{You never walk alone: The SideWalk backdoor gets a Linux variant}}, date = {2022-09-14}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2022/09/14/you-never-walk-alone-sidewalk-backdoor-linux-variant/}, language = {English}, urldate = {2022-09-19} } You never walk alone: The SideWalk backdoor gets a Linux variant
SideWalk
2022-03ESET ResearchVladislav Hrčka
@techreport{hrka:202203:under:04f52d9, author = {Vladislav Hrčka}, title = {{Under the hood of Wslink’s multilayered virtual machine}}, date = {2022-03}, institution = {ESET Research}, url = {https://www.welivesecurity.com/wp-content/uploads/2022/03/eset_wsliknkvm.pdf}, language = {English}, urldate = {2022-03-30} } Under the hood of Wslink’s multilayered virtual machine
Wslink
2021-10-27ESET ResearchVladislav Hrčka
@online{hrka:20211027:wslink:39610dc, author = {Vladislav Hrčka}, title = {{Wslink: Unique and undocumented malicious loader that runs as a server}}, date = {2021-10-27}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2021/10/27/wslink-unique-undocumented-malicious-loader-runs-server/}, language = {English}, urldate = {2021-12-06} } Wslink: Unique and undocumented malicious loader that runs as a server
Wslink
2021-10-07ESET ResearchVladislav Hrčka
@online{hrka:20211007:fontonlake:03cadd5, author = {Vladislav Hrčka}, title = {{FontOnLake: Previously unknown malware family targeting Linux}}, date = {2021-10-07}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2021/10/07/fontonlake-previously-unknown-malware-family-targeting-linux/}, language = {English}, urldate = {2021-10-11} } FontOnLake: Previously unknown malware family targeting Linux
FontOnLake
2020-08-07ESET ResearchVladislav Hrčka
@online{hrka:20200807:stadeo:9fc4787, author = {Vladislav Hrčka}, title = {{Stadeo: Deobfuscating Stantinko and more}}, date = {2020-08-07}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2020/08/07/stadeo-deobfuscating-stantinko-and-more/}, language = {English}, urldate = {2020-08-14} } Stadeo: Deobfuscating Stantinko and more
Stantinko
2020-03-19ESET ResearchVladislav Hrčka
@online{hrka:20200319:stantinkos:b6a60f8, author = {Vladislav Hrčka}, title = {{Stantinko’s new cryptominer features unique obfuscation techniques}}, date = {2020-03-19}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2020/03/19/stantinko-new-cryptominer-unique-obfuscation-techniques/}, language = {English}, urldate = {2020-03-26} } Stantinko’s new cryptominer features unique obfuscation techniques
Stantinko
2019-11-26ESET ResearchVladislav Hrčka
@online{hrka:20191126:stantinko:0fbdd59, author = {Vladislav Hrčka}, title = {{Stantinko botnet adds cryptomining to its pool of criminal activities}}, date = {2019-11-26}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2019/11/26/stantinko-botnet-adds-cryptomining-criminal-activities/}, language = {English}, urldate = {2020-01-12} } Stantinko botnet adds cryptomining to its pool of criminal activities
Stantinko