Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-01-16Twitter (@zachxbt)ZachXBT
@online{zachxbt:20230116:eth:953011c, author = {ZachXBT}, title = {{Tweet on ETH movement of Lazarus}}, date = {2023-01-16}, organization = {Twitter (@zachxbt)}, url = {https://twitter.com/zachxbt/status/1614771861266792449}, language = {English}, urldate = {2023-01-25} } Tweet on ETH movement of Lazarus
2022-03-21ProofpointBryan Campbell, Zachary Abzug, Andrew Northern, Selena Larson
@online{campbell:20220321:serpent:12b3381, author = {Bryan Campbell and Zachary Abzug and Andrew Northern and Selena Larson}, title = {{Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain}}, date = {2022-03-21}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/blog/threat-insight/serpent-no-swiping-new-backdoor-targets-french-entities-unique-attack-chain}, language = {English}, urldate = {2022-03-22} } Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain
Serpent
2022-01-19Recorded FutureZachary Haver, Roderick Lee, Morgan Clemens, Kenneth Allen, Insikt Group®
@techreport{haver:20220119:peoples:58d824b, author = {Zachary Haver and Roderick Lee and Morgan Clemens and Kenneth Allen and Insikt Group®}, title = {{The People's Liberation Army in the South China Sea: An Organizational Guide}}, date = {2022-01-19}, institution = {Recorded Future}, url = {https://go.recordedfuture.com/hubfs/reports/cta-2022-0119.pdf}, language = {English}, urldate = {2022-01-24} } The People's Liberation Army in the South China Sea: An Organizational Guide
2021-12-31victory mediumZach Edwards
@online{edwards:20211231:compromised:3ee8044, author = {Zach Edwards}, title = {{Compromised Godaddy Infrastructure Attacking Numerous U.S. Government Websites to Promote “Canadian Pharmacy” Scam Websites}}, date = {2021-12-31}, organization = {victory medium}, url = {https://victorymedium.com/godaddy-global-issues-canadian-pharmacy-injections/}, language = {English}, urldate = {2022-01-25} } Compromised Godaddy Infrastructure Attacking Numerous U.S. Government Websites to Promote “Canadian Pharmacy” Scam Websites
2021-10-07MandiantJoshua Shilko, Zach Riddle, Jennifer Brooks, Genevieve Stark, Adam Brunner, Kimberly Goody, Jeremy Kennelly
@online{shilko:20211007:fin12:43d89f5, author = {Joshua Shilko and Zach Riddle and Jennifer Brooks and Genevieve Stark and Adam Brunner and Kimberly Goody and Jeremy Kennelly}, title = {{FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets}}, date = {2021-10-07}, organization = {Mandiant}, url = {https://www.mandiant.com/resources/fin12-ransomware-intrusion-actor-pursuing-healthcare-targets}, language = {English}, urldate = {2021-10-08} } FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets
BazarBackdoor GRIMAGENT Ryuk
2021-07-04Twitter (@svch0st)Zach
@online{zach:20210704:kaseya:b5f39a7, author = {Zach}, title = {{Tweet on #Kaseya detection tool for detecting REvil}}, date = {2021-07-04}, organization = {Twitter (@svch0st)}, url = {https://twitter.com/svch0st/status/1411537562380816384}, language = {English}, urldate = {2021-07-24} } Tweet on #Kaseya detection tool for detecting REvil
REvil
2021-06-10ZEIT OnlineVon Kai Biermann, Astrid Geisler, Herwig G. Höller, Karsten Polke-Majewski, Zachary Kamel
@online{biermann:20210610:trail:42969a8, author = {Von Kai Biermann and Astrid Geisler and Herwig G. Höller and Karsten Polke-Majewski and Zachary Kamel}, title = {{On the Trail of the Internet Extortionists}}, date = {2021-06-10}, organization = {ZEIT Online}, url = {https://www.zeit.de/digital/2021-06/cybercrime-extortion-internet-spyware-ransomware-police-prosecution-hackers}, language = {English}, urldate = {2021-07-02} } On the Trail of the Internet Extortionists
Emotet Mailto
2021-02-09CofenseZachary Bailey
@online{bailey:20210209:bazarbackdoors:a9cf426, author = {Zachary Bailey}, title = {{BazarBackdoor’s Stealthy Infiltration Evades Multiple SEGs}}, date = {2021-02-09}, organization = {Cofense}, url = {https://cofense.com/blog/bazarbackdoor-stealthy-infiltration}, language = {English}, urldate = {2021-02-09} } BazarBackdoor’s Stealthy Infiltration Evades Multiple SEGs
BazarBackdoor
2021-01-28axiosZach Dorfman
@online{dorfman:20210128:in:58cbf10, author = {Zach Dorfman}, title = {{In cyber espionage, U.S. is both hunted and hunter}}, date = {2021-01-28}, organization = {axios}, url = {https://www.axios.com/american-cyber-warfare-solarwinds-d50815d6-2e03-4e3c-83ab-9d2f5e20d6f5.html}, language = {English}, urldate = {2021-01-29} } In cyber espionage, U.S. is both hunted and hunter
2020-07-15Yahoo NewsZach Dorfman, Kim Zetter, Jenna McLaughlin, Sean D. Naylor
@online{dorfman:20200715:exclusive:6a11ebe, author = {Zach Dorfman and Kim Zetter and Jenna McLaughlin and Sean D. Naylor}, title = {{Exclusive: Secret Trump order gives CIA more powers to launch cyberattacks}}, date = {2020-07-15}, organization = {Yahoo News}, url = {https://news.yahoo.com/secret-trump-order-gives-cia-more-powers-to-launch-cyberattacks-090015219.html}, language = {English}, urldate = {2020-07-16} } Exclusive: Secret Trump order gives CIA more powers to launch cyberattacks