Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-17GoogleVladislav Stolyarov, Benoit Sevens, Google Threat Analysis Group
@online{stolyarov:20220317:exposing:f818c6d, author = {Vladislav Stolyarov and Benoit Sevens and Google Threat Analysis Group}, title = {{Exposing initial access broker with ties to Conti}}, date = {2022-03-17}, organization = {Google}, url = {https://blog.google/threat-analysis-group/exposing-initial-access-broker-ties-conti/}, language = {English}, urldate = {2022-03-18} } Exposing initial access broker with ties to Conti
BazarBackdoor BumbleBee Cobalt Strike Conti
2022-03-17GoogleVladislav Stolyarov, Benoit Sevens
@online{stolyarov:20220317:exposing:5f565b6, author = {Vladislav Stolyarov and Benoit Sevens}, title = {{Exposing initial access broker with ties to Conti}}, date = {2022-03-17}, organization = {Google}, url = {https://blog.google/threat-analysis-group/exposing-initial-access-broker-ties-conti}, language = {English}, urldate = {2022-05-17} } Exposing initial access broker with ties to Conti
BazarBackdoor BumbleBee Conti EXOTIC LILY
2018-12-12Kaspersky LabsBoris Larin, Vladislav Stolyarov, Anton Ivanov
@online{larin:20181212:zeroday:4c8907e, author = {Boris Larin and Vladislav Stolyarov and Anton Ivanov}, title = {{Zero-day in Windows Kernel Transaction Manager (CVE-2018-8611)}}, date = {2018-12-12}, organization = {Kaspersky Labs}, url = {https://securelist.com/zero-day-in-windows-kernel-transaction-manager-cve-2018-8611/89253/}, language = {English}, urldate = {2019-12-20} } Zero-day in Windows Kernel Transaction Manager (CVE-2018-8611)
SandCat
2018-11-14KasperskyBoris Larin, Anton Ivanov, Vladislav Stolyarov
@online{larin:20181114:new:4fe240d, author = {Boris Larin and Anton Ivanov and Vladislav Stolyarov}, title = {{A new exploit for zero-day vulnerability CVE-2018-8589}}, date = {2018-11-14}, organization = {Kaspersky}, url = {https://securelist.com/a-new-exploit-for-zero-day-vulnerability-cve-2018-8589/88845/}, language = {English}, urldate = {2022-04-12} } A new exploit for zero-day vulnerability CVE-2018-8589
2018-05-09KasperskyBoris Larin, Anton Ivanov, Vladislav Stolyarov
@online{larin:20180509:king:395c5c8, author = {Boris Larin and Anton Ivanov and Vladislav Stolyarov}, title = {{The King is dead. Long live the King!}}, date = {2018-05-09}, organization = {Kaspersky}, url = {https://securelist.com/root-cause-analysis-of-cve-2018-8174/85486/}, language = {English}, urldate = {2022-04-12} } The King is dead. Long live the King!
2018-02-08KasperskyBoris Larin, Vladislav Stolyarov
@online{larin:20180208:how:73fd187, author = {Boris Larin and Vladislav Stolyarov}, title = {{How not to use a driver to execute code with kernel privileges}}, date = {2018-02-08}, organization = {Kaspersky}, url = {https://securelist.com/elevation-of-privileges-in-namco-driver/83707/}, language = {English}, urldate = {2022-04-12} } How not to use a driver to execute code with kernel privileges