Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-12-03Bleeping ComputerLawrence Abrams
Linux version of Qilin ransomware focuses on VMware ESXi
Qilin
2023-11-20vmwareAbe Schneider, Alan Ngo, Alex Murillo, Fae Carlisle, Nikki Benoit
NetSupport RAT: The RAT King Returns
NetSupportManager RAT
2023-11-06VMWare Carbon BlackAbe Schneider, Alan Ngo, Bria Beathley, Swee Lai Lee
Jupyter Rising: An Update on Jupyter Infostealer
solarmarker
2023-07-29BleepingComputerLawrence Abrams
Linux version of Abyss Locker ransomware targets VMware ESXi servers
Abyss Locker
2023-06-28vmwareBria Beathley, Dana Behling, Deborah Snyder, Fae Carlisle
8Base Ransomware: A Heavy Hitting Player
8Base Phobos SmokeLoader SystemBC
2023-06-28MandiantAlexander Marvi, Greg Blaum, Ron Craft
Detection, Containment, and Hardening Opportunities for Privileged Guest Operations, Anomalous Behavior, and VMCI Backdoors on Compromised VMware Hosts
UNC3886
2023-06-13MandiantMandiant
VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors
2023-06-13MandiantAlexander Marvi, BRAD SLAYBAUGH, Ron Craft, Rufus Brown
VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors (UNC3886)
UNC3886
2023-06-01vmwareFae Carlisle
Carbon Black’s TrueBot Detection
Silence
2023-05-01Quorum CyberQuorum Cyber
RTM Locker ransomware targets VMware ESXi servers
RTM Locker
2023-03-31vmwareThreat Analysis Unit
Investigating 3CX Desktop Application Attacks: What You Need to Know
3CX Backdoor
2023-02-03Bleeping ComputerSergiu Gatlan
Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide
ESXiArgs
2023-02-03OVHcloudJulien Levrard
Ransomware targeting VMware ESXi
ESXiArgs
2022-11-21vmwareTakahiro Haruyama, Threat Analysis Unit
Threat Analysis: Active C2 Discovery Using Protocol Emulation Part4 (Dacls, aka MATA)
Dacls
2022-11-14vmwareBethany Hardin, Deborah Snyder, Lavine Oluoch, Nikki Benoit, Tatiana Vollbrecht
BATLOADER: The Evasive Downloader Malware
BATLOADER
2022-10-27vmwareTakahiro Haruyama
Threat Analysis: Active C2 Discovery Using Protocol Emulation Part3 (ShadowPad)
ShadowPad
2022-10-25VMware Threat Analysis UnitTakahiro Haruyama
Tracking the entire iceberg: long-term APT malware C2 protocol emulation and scanning
ShadowPad Winnti
2022-10-20FortinetCara Lin
Mirai, RAR1Ransom, and GuardMiner – Multiple Malware Campaigns Target VMware Vulnerability
Mirai
2022-10-15vmwareDana Behling
LockBit 3.0 Ransomware Unlocked
LockBit
2022-10-03vmwareThreat Analysis Unit
Emotet Exposed: A Look Inside the Cybercriminal Supply Chain
Emotet