Threat Level: green Handler on Duty: Jim Clausing

SANS ISC: Diaries by Keyword Diaries by Keyword

Watch ISC TV. Great for NOCs, SOCs and Living Rooms: https://isctv.sans.edu

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Date Author Title

RIG EK

2015-04-01Brad DuncanRig Exploit Kit Changes Traffic Patterns

RIG

2019-12-26/a>Xavier MertensBypassing UAC to Install a Cryptominer
2019-09-12/a>Xavier MertensRig Exploit Kit Delivering VBScript
2019-08-14/a>Brad DuncanRecent example of MedusaHTTP malware
2019-06-25/a>Brad DuncanRig Exploit Kit sends Pitou.B Trojan
2019-06-17/a>Brad DuncanAn infection from Rig exploit kit
2017-02-09/a>Brad DuncanCryptoShield Ransomware from Rig EK
2015-07-28/a>Rick WannerAndroid Stagefright multimedia viewer prone to remote exploitation
2015-04-01/a>Brad DuncanRig Exploit Kit Changes Traffic Patterns
2012-05-25/a>Guy BruneauGoogle Publish Transparency Report
2011-07-09/a>Tony CarothersCopyright Alert System - What say you?
2009-03-10/a>Swa FrantzenBrowser plug-ins, transparent proxies and same origin policies

EK

2019-11-10/a>Jan KoprivaDid the recent malicious BlueKeep campaign have any positive impact when it comes to patching?
2019-11-05/a>Rick WannerBluekeep exploitation causing Bluekeep vulnerability scan to fail
2019-09-12/a>Xavier MertensRig Exploit Kit Delivering VBScript
2019-08-14/a>Brad DuncanRecent example of MedusaHTTP malware
2019-08-05/a>Rick WannerScanning for Bluekeep vulnerable RDP instances
2019-05-22/a>Johannes UllrichAn Update on the Microsoft Windows RDP "Bluekeep" Vulnerability (CVE-2019-0708) [now with pcaps]
2017-02-09/a>Brad DuncanCryptoShield Ransomware from Rig EK
2016-08-31/a>Deborah HaleAngler Exploit Kits Reported
2016-04-21/a>Daniel WesemannDecoding Pseudo-Darkleech (#1)
2016-04-21/a>Daniel WesemannDecoding Pseudo-Darkleech (Part #2)
2015-07-27/a>Daniel WesemannAngler's best friends
2015-05-03/a>Russ McReeVolDiff, for memory image differential analysis
2015-04-02/a>Brad DuncanAngler Exploit Kit - Recent Traffic Patterns
2015-04-01/a>Brad DuncanRig Exploit Kit Changes Traffic Patterns
2014-03-07/a>Tom WebbLinux Memory Dump with Rekall
2014-03-02/a>Stephen HallSunday Reading
2009-10-02/a>Stephen HallNew SysInternal fun for the weekend