ABCDEFGHIJKLMNOPQRSTUVWXYZAAABACADAEAF
1
uTHREAT LEVELQuery Result TotalAve. Domain RatingAve. URL RatingAve. Referring DomainsAve. Linked DomainsAve. External LinksAve. # of Keywords/URLAve. Traffic/URL10
2
0-532,84443.721.1484.106322758.170.45Threat LevelBacklink QuantityRemoval Required Probability
3
0.91%52981.180.690.67742.481881.653.490.07529880.00%
4
0.54%41762.450.630.73297.52725.892.770.44417660.00%
5
7.07%32,3212.261.020.4857.4197.620.030.0032,32140.00%
6
1.87%261511.541.120.3486.28141.760.310.02261520.00%
7
0.00%100.000.000.000.000.000.000.001010.00%
8
89.62%Good Links29,43453.701.173.4849.21220.092.020.42
9
10
Referring page titleReferring page URLLanguagePlatformReferring page HTTP codeDomain ratingURDomain trafficReferring domainsLinked domainsExternal linksPage traffic/urlKeywords/urlTarget URLLeft contextAnchorRight contextTypeContentNofollowUGCSponsoredRenderedRawLost statusDrop reasonDiscovered statusFirst seenLast seenLostLinks in group
11
FALSE
YARA - The pattern matching swiss knife for malware researchers
https://virustotal.github.io/yara/20068301.24E+03635831431241110http://reversinglabs.com/ReversingLabstextFALSEFALSEFALSEFALSEFALSETRUElinkrestored################4
12
FALSE
APWG | Unifying The Global Response To Cybercrime
https://apwg.org/en
ecommerce, wordpress
20081395.04E+0251043070442351https://www.reversinglabs.com/textFALSEFALSEFALSEFALSETRUETRUEremovedfromhtmllinkrestored########################2
13
FALSE
OWASP CycloneDX Software Bill of Materials (SBOM) Standard
https://cyclonedx.org/200672841711339917526463https://www.reversinglabs.com/ReversingLabsimageFALSEFALSEFALSEFALSEFALSETRUElinkfound################5
14
FALSE
Open Source Summit North America | Linux Foundation Events
https://events.linuxfoundation.org/open-source-summit-north-america/
enwordpress20087297.32E+0470190128166263https://www.reversinglabs.com/ReversingLabs logoimageFALSEFALSEFALSEFALSEFALSETRUElinkfound################110
15
FALSE
About - urlscan.io
https://urlscan.io/about/en20073101317438551931427
https://www.reversinglabs.com/blog/rats-in-the-library
2020-01-31 - Reversing Labs -
RATs in the LibrarytextFALSEFALSEFALSEFALSEFALSETRUElinkfound################4
16
FALSE
Top Cybersecurity Companies That are Hiring | ESF
https://www.enterprisestorageforum.com/management/cybersecurity-companies-hiring/
enwordpress200694.52.38E+0452542119116https://www.reversinglabs.com/company/careersadvanced threat intelligence for cloud servicestextTRUEFALSEFALSEFALSEFALSETRUEpagefound################1
17
FALSE
Find Your Dream Remote Tech Job
https://www.remoterocketship.com/en20032121.84E+03481133110287https://www.reversinglabs.com/Website
LinkedIn All Job Openings
textFALSEFALSEFALSEFALSETRUEFALSEremovedfromhtmllinkrestored########################6
18
FALSE
ReversingLabs - Crunchbase Company Profile & Funding
https://www.crunchbase.com/organization/reversinglabsen200901.9839280114101510819http://www.reversinglabs.com/www.reversinglabs.com/textFALSETRUEFALSEFALSETRUETRUEpagefound################2
19
FALSE
ReversingLabs - Crunchbase Company Profile & Funding
https://www.crunchbase.com/organization/reversinglabsen200901.983928011481710819https://reversinglabs.com/newsroom/press-releases/crosspoint-capital-partners-announces-investment-in-software-security-pioneer-reversinglabsCrosspoint Capital Partners Announces Investment in Software Security Pioneer ReversingLabstextFALSETRUEFALSEFALSETRUETRUEremovedfromhtmlpagefound########################3
20
FALSE
Trellix Security Innovation Alliance Partner Directory | Trellix
https://www.trellix.com/en-us/partners/security-innovation-alliance/directory.html
en2007981.09E+05181101339444https://www.reversinglabs.com/ReversingLabsimageFALSEFALSEFALSEFALSETRUETRUEpagefound################6
21
FALSE
GitHub - VirusTotal/yara: The pattern matching swiss knife
https://github.com/VirusTotal/yaraen200962523348544692871115522https://www.reversinglabs.com/ReversingLabstextFALSETRUEFALSEFALSEFALSETRUElinkrestored################2
22
FALSE
How Malware Hides in Images and What You Can Do About It
https://gizmodo.com/malware-images-virus-photos-pictures-how-block-antiviru-1849572516
en20090161.76E+0648192455236https://www.reversinglabs.com/blog/malware-in-imagesa great blog posttextTRUEFALSEFALSEFALSEFALSETRUElinkfound################2
23
FALSE
Intelligence & National Security Summit
https://intelsummit.org/en200371751126294446181https://www.reversinglabs.com/ReversingLabs LogoimageFALSEFALSEFALSEFALSETRUEFALSEremovedfromhtmllinkfound########################2
24
FALSE
2023 Americas Spring Summit
https://www.fsisac.com/events/2023-americas-springen20074131632351251513762https://www.reversinglabs.com/ReversingLabs - ColorimageFALSETRUEFALSEFALSETRUETRUElinkfound################1
25
FALSE
Objective-See: Mac Malware Collection
https://objective-see.org/malware.html200711220361226144533151https://www.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdkinfotextFALSEFALSEFALSEFALSETRUEFALSElinkrestored################1
26
4
APTMAP - Advanced Persistent Threat Map
https://andreacristaldi.github.io/APTmap/en20074.32.90E+016493647329130https://www.reversinglabs.com/blog/unpacking-kwampirs-rathttps://blog.reversinglabs.com/blog/unpacking-kwampirs-rattextFALSEFALSEFALSEFALSETRUEFALSEremovedfromhtmllinkfound########################2
27
4
APTMAP - Advanced Persistent Threat Map
https://andreacristaldi.github.io/APTmap/en20074.3296493647329130https://blog.reversinglabs.com/blog/after-russian-arrests-revil-rolls-onhttps://blog.reversinglabs.com/blog/after-russian-arrests-revil-rolls-ontextFALSEFALSEFALSEFALSETRUEFALSEremovedfromhtmllinkfound########################2
28
FALSE
15 Best VirusTotal Alternatives 2023 - Rigorous Themes
https://rigorousthemes.com/blog/best-virustotal-alternatives/enwordpress20084124941561718287
https://www.reversinglabs.com/products/file-reputation-service
9ReversingLabs TitaniumCloudtextTRUETRUEFALSEFALSEFALSETRUEpagefound################1
29
FALSE
GitHub - x64dbg/ScyllaHide: Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide
https://github.com/x64dbg/ScyllaHideen2009619244962841701420277
https://www.reversinglabs.com/open-source/titanengine.html
TitanEngine v2 (
original
and updated versions)
textFALSETRUEFALSEFALSETRUETRUEpagefound################6
30
FALSE
Strategic Investments
https://www.jpmorgan.com/technology/strategic-investmentsen2008685970461356992477https://www.reversinglabs.com/Visit website : opens new tabtextFALSEFALSEFALSEFALSEFALSETRUEremovedfromhtmlpagefound########################1
31
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/200301227367292314https://www.reversinglabs.com/webinars/why-app-sec-tools-fail-at-software-supply-chain-securitysign up nowtextFALSEFALSEFALSEFALSEFALSETRUEremovedfromhtmllinkfound########################2
32
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/200301227367262314https://register.reversinglabs.com/forrester-report-software-composition-analysis-landscapeLEARN MOREtextFALSEFALSEFALSEFALSEFALSETRUEremovedfromhtmllinkfound########################24
33
FALSE
Researchers Uncover Obfuscated Malicious Code in PyPI Python Packages
https://thehackernews.com/2023/02/researchers-uncover-obfuscated.html
en200842122274118631582255
https://www.reversinglabs.com/blog/open-source-malware-sows-havoc-on-supply-chain
post-exploitation, command-and-control framework named Havoc ," ReversingLabs researcher Lucija Valentić
said.textTRUEFALSEFALSEFALSETRUETRUEpagefound################1
34
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/blog/tampering-lurks-below-the-surface-key-problems-with-software-integrity-validationRead our research team post on accidental software tamperingimageFALSEFALSEFALSEFALSETRUETRUElinkfound################1
35
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en20030132.60E+01348342211https://www.reversinglabs.com/
ReversingLabs logo gray
All rights reserved ReversingLabs © 2023 | Privacy
imageFALSEFALSEFALSEFALSETRUETRUEpagefound################12
36
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211
https://www.reversinglabs.com/privacy-policy
All rights reserved ReversingLabs © 2023 |
Privacy Policy| CookiestextFALSEFALSEFALSEFALSETRUETRUEpagefound################12
37
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/newsroom/newsIn the NewstextFALSEFALSEFALSEFALSETRUETRUEpagefound################69
38
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en20030132.60E+01348342211https://www.reversinglabs.com/company/about-usSecure Software AwardsimageFALSEFALSEFALSEFALSETRUETRUEpagefound################1
39
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/blog/tag/threat-researchLearn More With Our BlogimageFALSEFALSEFALSEFALSETRUETRUElinkfound################1
40
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en20030132.60E+01348342211https://www.reversinglabs.com/blog/groundhog-day-npm-package-caught-stealing-browser-passwords
NPM: Developer accounts under attack
RubyGems: Persistent malware threats
imageFALSEFALSEFALSEFALSETRUETRUElinkfound################1
41
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealthLearn how we found the SunBurst build compromiseimageFALSEFALSEFALSEFALSETRUETRUElinkfound################1
42
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/software-package-deconstruction-seriesLearn MoretextFALSEFALSEFALSEFALSETRUETRUElinkfound################3
43
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211
https://www.reversinglabs.com/cookie-policy
© 2023 | Privacy Policy |
CookiestextFALSEFALSEFALSEFALSETRUETRUEpagefound################12
44
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/company/leadershipLeadershipimageFALSEFALSEFALSEFALSETRUETRUEpagefound################68
45
FALSE
Valence Security raises new cash to secure the SaaS app supply chain | TechCrunch
https://techcrunch.com/2022/10/26/valence-security-raises-fresh-capital-to-secure-the-saas-app-supply-chain/
enwordpress2009220599629011018262257
https://www.reversinglabs.com/newsroom/press-releases/survey-software-supply-chain-risk-software-tampering
This opens firms to attack. According to a Dimensional Research
survey
commissioned by ReversingLabs, a cybersecurity vendor, just over half (51%)
textTRUEFALSEFALSEFALSETRUETRUEpagefound################1
46
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301226348332211https://www.reversinglabs.com/webinar/deconstructing-3cx-red-flags-misses-and-failures-to-address-the-software-supply-chain-threatWatch On DemandtextFALSEFALSEFALSEFALSETRUETRUEremovedfromhtmllinkfound########################8
47
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/contact-usContact UstextFALSEFALSEFALSEFALSETRUETRUEpagefound################68
48
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/blog/rss.xmlRSStextFALSEFALSEFALSEFALSETRUETRUElinkfound################138
49
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/reports/flying-blind-software-firms-struggle-to-detect-supply-chain-hacksAre You Flying Blind?imageFALSEFALSEFALSEFALSETRUETRUEpagefound################1
50
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/webinar/revealing-the-biggest-concerns-about-software-supply-chain-securitySign Up NowtextFALSEFALSEFALSEFALSETRUETRUElinkfound################3
51
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/newsroom/press-releasesPress ReleasestextFALSEFALSEFALSEFALSETRUETRUEpagefound################69
52
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/blog/beware-impostor-http-libraries-lurk-on-pypiPython: Malicious payloadsimageFALSEFALSEFALSEFALSETRUETRUElinkfound################1
53
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/blog/its-not-a-secret-if-you-publish-it-on-pypiRead our research team post on detecting exposed secretsimageFALSEFALSEFALSEFALSETRUETRUElinkfound################1
54
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://register.reversinglabs.com/free_softwarebillofmaterialsLet us help by analyzing your software package for you. Sign up for a free SBOM report & analysis. No sales call required.textFALSEFALSEFALSEFALSETRUETRUElinkfound################2
55
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/company/careersCareersimageFALSEFALSEFALSEFALSETRUETRUEpagefound################69
56
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://register.reversinglabs.com/why-traditional-app-sec-testing-fails-on-software-supply-chain-securityRead NowtextFALSEFALSEFALSEFALSETRUETRUElinkrestored################9
57
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/software-supply-chain-security-free-trial
Start a Free Trial
Request a Demo
textFALSEFALSEFALSEFALSETRUETRUElinkfound################1
58
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/blog/mining-for-malicious-ruby-gems
RubyGems: Persistent malware threats
Python: Malicious payloads
imageFALSEFALSEFALSEFALSETRUETRUElinkfound################1
59
FALSE
ReversingLabs secure.software Software Supply Chain Security
https://www.secure.software/en200301326348342211https://www.reversinglabs.com/eventsEventstextFALSEFALSEFALSEFALSETRUETRUEpagefound################69
60
FALSE
RSAC 2023 Parties – Unofficial list of RSA Conference and Vendor Parties
https://conferenceparties.com/rsac2023/enwordpress2002710346109011819224https://register.reversinglabs.com/happy-hour-rsvp-rsa-2023Happy Hour with ReversingLabstextFALSEFALSEFALSEFALSETRUETRUElinkfound################1
61
FALSE
Indian Strategic Studies
https://www.strategicstudyindia.com/en200229364346791915
https://www.reversinglabs.com/blog/the-3cx-supply-chain-hack-just-got-crazier.-heres-what-you-need-to-know
At this year’s event,
the recent 3CX hack
ensured that conversations about the security of software supply chains
textFALSEFALSEFALSEFALSETRUETRUEremovedfromhtmllinkfound########################1
62
FALSE
Hackers eye “Havoc” for C2 diversity
https://thestack.technology/hackers-havoc-c2/enwordpress2006556025315201812
https://www.reversinglabs.com/blog/open-source-malware-sows-havoc-on-supply-chain
via a malicious npm package (Aabquerys) typosquatting legitimate module, as
revealed
in a report from ReversingLabs’ research team earlier this month
textTRUEFALSEFALSEFALSEFALSETRUEpagefound################1
63
FALSE
表示するだけでアウト。画像に隠されたマルウェアの脅威とその対処法 | ギズモード・ジャパン
https://www.gizmodo.jp/2022/10/malware-images-virus-photos.html
ja200774.54531031425421822
https://www.reversinglabs.com/blog/malware-in-images
他のセキュリティ脅威の場合と同様に、マルウェアを開発する悪質な業者とセキュリティエキスパートは、常に先手を打つための戦いを続けています。例えば、脅威インテリジェンス企業のReversing Labs社は、画像に添付されたEXIFデータ(写真がいつ撮影され、どのカメラが使用されたかの詳細)がコードを実行する際、どのように改ざんされるか、
とても参考になるブログ記事を発表
しています。このほかにも事例がたくさんあります。
textTRUEFALSEFALSEFALSETRUETRUElinkfound################2
64
FALSE
GitHub - reversinglabs/reversinglabs-yara-rules: ReversingLabs YARA Rules
https://github.com/reversinglabs/reversinglabs-yara-rulesen2009611244962845545171https://www.reversinglabs.com/www.reversinglabs.comtextFALSEFALSEFALSEFALSETRUETRUElinkrestored################2
65
FALSE
The top 20 most notable Mac malware threats of 2022 - The Mac Security Blog
https://www.intego.com/mac-security-blog/20-top-apple-malware-threats-in-2022/
enwordpress200754.76405415316215176
https://www.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdk
On December 19, Karlo Zanki
wrote
about SentinelSneak, a Trojan horse masquerading as software related to
textTRUETRUEFALSEFALSETRUETRUEpagefound################1
66
FALSEhttps://www.estudent.hr/partnerihr, en200370.989570217255156https://www.reversinglabs.com/ReversingLabsimageFALSEFALSEFALSEFALSEFALSETRUElinkfound################2
67
FALSE
Threat Intelligence Feeds | Anomali
https://www.anomali.com/marketplace/threat-intelligence-feeds20071980271549801442https://www.reversinglabs.com/WebsitetextFALSEFALSEFALSEFALSEFALSETRUEpagefound################8
68
FALSE
AstraLocker ransomware decryptors released by Emsisoft | The Daily Swig
https://portswigger.net/daily-swig/astralocker-ransomware-decryptors-released-by-emsisoft
en200828184049138241435
https://blog.reversinglabs.com/blog/smash-and-grab-astralocker-2-pushes-ransomware-direct-from-office-docs
variant deployed via a ransomware-as-a-service (RaaS) model, according to a
ReversingLabs analysis
of the latter’s leaked source code.
textTRUETRUEFALSEFALSEFALSETRUEpagefound################2
69
FALSE
The Secret History Of TLC's History-Making Hit 'Waterfalls' | HuffPost HuffPost Personal
https://www.huffpost.com/entry/tlc-waterfalls-history_n_5b9030eee4b0511db3de9bb1
en200923.5320197615233514104
https://www.reversinglabs.com/solutions/protect-against-software-supply-chain-attacks
along with Watkins stars in the new music documentary series
“Once In A Lifetime Sessions”
on Netflix , recently chatted with HuffPost about the song’s
textTRUEFALSEFALSEFALSEFALSETRUElinkfound################1
70
FALSE
Cyble — Phishing Campaign Targeting Indonesian BRI Bank Using SMS Stealer
https://blog.cyble.com/2022/11/15/phishing-campaign-targeting-indonesian-bri-bank-using-sms-stealer/
enwordpress200693.8475067151332
https://www.reversinglabs.com/blog/iconburst-npm-software-supply-chain-attack-grabs-data-from-apps-websites
C&C server has been observed in a campaign identified by
Reversing Labs
that installs malicious NPM modules to harvest sensitive data from
textTRUEFALSEFALSEFALSEFALSETRUElinkfound################2
71
FALSE
Deep Malware Analysis - Joe Sandbox Cloud
https://www.joesecurity.org/joe-sandbox-cloud2006095457362881117https://www.reversinglabs.com/textFALSEFALSEFALSEFALSEFALSETRUEpagefound################13
72
FALSE
CycloneDX Tool Center
https://cyclonedx.org/tool-center/200671541715111025211103https://www.reversinglabs.com/products/software-supply-chain-securityproprietary build-integration secure.software ReversingLabs Software supply chain security protection for CI/CD workflows, containers, and release packages that enables DevSecOps teams to release software with confidence.textFALSEFALSEFALSEFALSEFALSETRUElinkfound################2
73
FALSE
Hackers start using Havoc post-exploitation framework in attacks
https://www.bleepingcomputer.com/news/security/hackers-start-using-havoc-post-exploitation-framework-in-attacks/
en20087145132301197121063
https://www.reversinglabs.com/blog/open-source-malware-sows-havoc-on-supply-chain
via a malicious npm package (Aabquerys) typosquatting legitimate module, as
revealed
in a report from ReversingLabs' research team earlier this month.
textTRUETRUEFALSEFALSEFALSETRUEpagefound################1
74
FALSE
How to Apply a License to Your Open Source Software Project - FOSSA
https://fossa.com/blog/apply-license-open-source-software-project/
en20071797591920259254
https://blog.reversinglabs.com/blog/mining-for-malicious-ruby-gems?ref=fossa.com
open source project (such as malware distributed as part of
Ruby Gems).textTRUEFALSEFALSEFALSETRUETRUElinkfound################1
75
FALSE
0xSI_f33d - Portugal Abuse Open Feed
https://feed.seguranca-informatica.pt/en2004710191343853912https://www.reversinglabs.com/imageFALSEFALSEFALSEFALSEFALSETRUEpagefound################2
76
FALSE
Someone may be prepping an NPM crypto-mining spree • The Register
https://www.theregister.com/2022/07/07/npm-cryptomining-attack/
en2008912200233571219914
https://blog.reversinglabs.com/blog/iconburst-npm-software-supply-chain-attack-grabs-data-from-apps-websites
username cloudyboi12 – comes as another software supply-chain attack, dubbed
IconBurst
, made involved NPM JavaScript packages and typo-squatting.
textTRUETRUEFALSEFALSETRUETRUEpagefound################2
77
FALSE
Who signed my cert? | Enable Sysadmin
https://www.redhat.com/sysadmin/who-signed-my-certen200913.216324757915996
https://www.reversinglabs.com/blog/digital-certificates-impersonated-executives-as-certificate-identity-fronts
Threat Actor Fraudulently Buys Digital Certificates to Spread Malware and
Reversing Labs: Digital Certificates - Models for Trust and Targets for Misuse
.textTRUEFALSEFALSEFALSETRUETRUElinkfound################4
78
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html20070151.78E+031301572256668262https://www.reversinglabs.com/blog/forging-the-shadowhammerhttps://blog.reversinglabs.com/blog/forging-the-shadowhammertextFALSEFALSEFALSEFALSEFALSETRUElinkfound################4
79
FALSE
Automated Malware Analysis - Joe Sandbox Cloud Basic
https://www.joesandbox.com/analysis/1152012en20058033749081481http://www.reversinglabs.com/imageFALSEFALSEFALSEFALSEFALSETRUEpagefound################13794
80
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://blog.reversinglabs.com/blog/catching-lateral-movement-in-internal-emailshttps://blog.reversinglabs.com/blog/catching-lateral-movement-in-internal-emailstextFALSEFALSEFALSEFALSEFALSETRUElinkrestored################4
81
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://blog.reversinglabs.com/blog/rats-in-the-libraryhttps://blog.reversinglabs.com/blog/rats-in-the-librarytextFALSEFALSEFALSEFALSEFALSETRUElinkrestored################4
82
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://www.reversinglabs.com/blog/rana-android-malwarehttps://blog.reversinglabs.com/blog/rana-android-malwaretextFALSEFALSEFALSEFALSEFALSETRUElinkfound################4
83
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://blog.reversinglabs.com/blog/retread-ransomwarehttps://blog.reversinglabs.com/blog/retread-ransomwaretextFALSEFALSEFALSEFALSEFALSETRUElinkrestored################4
84
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://blog.reversinglabs.com/blog/hidden-cobrahttps://blog.reversinglabs.com/blog/hidden-cobratextFALSEFALSEFALSEFALSEFALSETRUElinkrestored################4
85
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://blog.reversinglabs.com/blog/smash-and-grab-astralocker-2-pushes-ransomware-direct-from-office-docshttps://blog.reversinglabs.com/blog/smash-and-grab-astralocker-2-pushes-ransomware-direct-from-office-docstextFALSEFALSEFALSEFALSEFALSETRUElinkfound################4
86
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://blog.reversinglabs.com/blog/conversinglabs-ep-2-conti-pivots-as-ransomware-as-a-service-struggleshttps://blog.reversinglabs.com/blog/conversinglabs-ep-2-conti-pivots-as-ransomware-as-a-service-strugglestextFALSEFALSEFALSEFALSEFALSETRUElinkfound################4
87
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://www.reversinglabs.com/blog/dotnet-loadershttps://blog.reversinglabs.com/blog/dotnet-loaderstextFALSEFALSEFALSEFALSEFALSETRUElinkfound################4
88
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://blog.reversinglabs.com/blog/unpacking-kwampirs-rathttps://blog.reversinglabs.com/blog/unpacking-kwampirs-rattextFALSEFALSEFALSEFALSEFALSETRUElinkrestored################4
89
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://blog.reversinglabs.com/blog/hunting-for-ransomwarehttps://blog.reversinglabs.com/blog/hunting-for-ransomwaretextFALSEFALSEFALSEFALSEFALSETRUElinkrestored################4
90
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://www.reversinglabs.com/blog/poorweb-exploiting-document-formatshttps://blog.reversinglabs.com/blog/poorweb-exploiting-document-formatstextFALSEFALSEFALSEFALSEFALSETRUElinkfound################4
91
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://blog.reversinglabs.com/blog/spotting-malicious-excel4-macroshttps://blog.reversinglabs.com/blog/spotting-malicious-excel4-macrostextFALSEFALSEFALSEFALSEFALSETRUElinkfound################4
92
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://www.reversinglabs.com/blog/threat-analysis-follina-exploit-powers-live-off-the-land-attackshttps://blog.reversinglabs.com/blog/threat-analysis-follina-exploit-powers-live-off-the-land-attackstextFALSEFALSEFALSEFALSEFALSETRUElinkfound################4
93
FALSE
REvil ransomware member extradited to U.S. to stand trial for Kaseya attack
https://www.bleepingcomputer.com/news/security/revil-ransomware-member-extradited-to-us-to-stand-trial-for-kaseya-attack/
en20087125132304871187
https://www.reversinglabs.com/blog/after-russian-arrests-revil-rolls-on
suspected members of REvil, yet the leading operators are still
assumedto be free.textTRUETRUEFALSEFALSEFALSETRUEpagefound################2
94
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealthhttps://blog.reversinglabs.com/blog/sunburst-the-next-level-of-stealthtextFALSEFALSEFALSEFALSEFALSETRUElinkfound################4
95
FALSE
Taidoor malware: what it is, how it works and how to prevent it | malware spotlight | Infosec Resources
https://resources.infosecinstitute.com/topic/taidoor-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/
enwordpress200804.582712281283https://www.reversinglabs.com/blog/taidoor-a-truly-persistent-threat
Taidoor analysis
, Reversing Labs
textTRUEFALSEFALSEFALSEFALSETRUElinkfound################2
96
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://blog.reversinglabs.com/blog/code-reuse-across-packers-and-dll-loadershttps://blog.reversinglabs.com/blog/code-reuse-across-packers-and-dll-loaderstextFALSEFALSEFALSEFALSEFALSETRUElinkfound################4
97
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://blog.reversinglabs.com/blog/reversinglabs-yara-rule-detects-badrabbit-encryption-routine-specificshttps://www.reversinglabs.com/newsroom/news/reversinglabs-yara-rule-detects-badrabbit-encryption-routine-specifics.htmltextFALSEFALSEFALSEFALSEFALSETRUElinkrestored################6
98
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://www.reversinglabs.com/blog/mirai-botnet-continues-to-plague-iot-spacehttps://blog.reversinglabs.com/blog/mirai-botnet-continues-to-plague-iot-spacetextFALSEFALSEFALSEFALSEFALSETRUElinkfound################4
99
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://blog.reversinglabs.com/blog/taidoor-a-truly-persistent-threathttps://blog.reversinglabs.com/blog/taidoor-a-truly-persistent-threattextFALSEFALSEFALSEFALSEFALSETRUElinkrestored################4
100
FALSE
MISP Galaxy Clusters
https://www.misp-project.org/galaxy.html200701517831301572256668262https://blog.reversinglabs.com/blog/data-exfiltratorhttps://blog.reversinglabs.com/blog/data-exfiltratortextFALSEFALSEFALSEFALSEFALSETRUElinkfound################4