Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-01-17SecureworksTamada Kiyotaka, Keita Yamazaki, You Nakatsuru
@techreport{kiyotaka:20200117:is:969ff38, author = {Tamada Kiyotaka and Keita Yamazaki and You Nakatsuru}, title = {{Is It Wrong to Try to Find APT Techniques in Ransomware Attack?}}, date = {2020-01-17}, institution = {Secureworks}, url = {https://jsac.jpcert.or.jp/archive/2020/pdf/JSAC2020_1_tamada-yamazaki-nakatsuru_en.pdf}, language = {English}, urldate = {2020-04-06} } Is It Wrong to Try to Find APT Techniques in Ransomware Attack?
Defray Dharma FriedEx Gandcrab GlobeImposter Matrix Ransom MedusaLocker Phobos Ransomware REvil Ryuk SamSam Scarab Ransomware
2019-01-18Dell SecureworksYou Nakatsuru
@techreport{nakatsuru:20190118:understanding:15cc8b9, author = {You Nakatsuru}, title = {{Understanding Command and Control - An Anatomy of xxmm Communication}}, date = {2019-01-18}, institution = {Dell Secureworks}, url = {https://jsac.jpcert.or.jp/archive/2019/pdf/JSAC2019_8_nakatsuru_en.pdf}, language = {English}, urldate = {2019-12-10} } Understanding Command and Control - An Anatomy of xxmm Communication
xxmm
2015-11-19JPCERT/CCYou Nakatsuru
@online{nakatsuru:20151119:decrypting:8be1808, author = {You Nakatsuru}, title = {{Decrypting Strings in Emdivi}}, date = {2015-11-19}, organization = {JPCERT/CC}, url = {http://blog.jpcert.or.jp/2015/11/decrypting-strings-in-emdivi.html}, language = {English}, urldate = {2019-11-28} } Decrypting Strings in Emdivi
Emdivi