Date Author Title
2024-12-09Jesse La GrewCURLing for Crypto on Honeypots
2024-11-26Jesse La Grew[Guest Diary] Using Zeek, Snort, and Grafana to Detect Crypto Mining Malware
2024-09-18Xavier MertensPython Infostealer Patching Windows Exodus App
2023-05-30Johannes UllrichYour Business Data and Machine Learning at Risk: Attacks Against Apache NiFi
2023-01-15Johannes UllrichElon Musk Themed Crypto Scams Flooding YouTube Today
2022-06-22Xavier MertensMalicious PowerShell Targeting Cryptocurrency Browser Extensions
2022-04-21Xavier MertensMulti-Cryptocurrency Clipboard Swapper
2021-08-30Xavier MertensCryptocurrency Clipboard Swapper Delivered With Love
2021-03-19Xavier MertensPastebin.com Used As a Simple C2 Channel
2020-11-07Guy BruneauCryptojacking Targeting WebLogic TCP/7001
2020-02-02Didier StevensVideo: Stego & Cryptominers
2020-01-16Bojan ZdrnjaSumming up CVE-2020-0601, or the Let?s Decrypt vulnerability
2019-12-26Xavier MertensBypassing UAC to Install a Cryptominer
2019-01-10Brad DuncanHeartbreaking Emails: "Love You" Malspam
2019-01-02Xavier MertensMalicious Script Leaking Data via FTP
2018-10-05Jim ClausingA strange spam
2018-09-07Xavier MertensCrypto Mining in a Windows Headless Browser
2018-08-30Xavier MertensCrypto Mining Is More Popular Than Ever!
2018-07-13Xavier MertensCryptominer Delivered Though Compromized JavaScript File
2018-06-29Remco VerhoefCrypto community target of MacOS malware
2018-05-03Renato MarinhoWebLogic Exploited in the Wild (Again)
2018-03-04Xavier MertensThe Crypto Miners Fight For CPU Cycles
2018-01-30Kevin ListonUsing FLIR in Incident Response?
2018-01-11Xavier MertensMining or Nothing!
2017-02-09Brad DuncanCryptoShield Ransomware from Rig EK
2014-08-05Johannes UllrichSynolocker: Why OFFLINE Backups are important
2014-06-02John BambenekGameover Zeus and Cryptolocker Takedowns
2014-05-30Johannes UllrichFake Australian Electric Bill Leads to Cryptolocker
2013-10-22John BambenekCryptolocker Update, Request for Info
2012-10-04Johannes UllrichCyber Security Awareness Month - Day 4: Crypto Standards
2012-04-02Johannes UllrichSHA 1-2-3
2010-01-06Guy BruneauSecure USB Flaw Exposed