https://www.acronis.com/en-us/articles/avaddon-ransomware |
https://www.cyber.gov.au/sites/default/files/2021-05/2021-003%20Ongoing%20campaign%20using%20Avaddon%20Ransomware%20-%2020210508.pdf |
https://arxiv.org/pdf/2102.04796.pdf |
https://atos.net/en/lp/securitydive/avaddon-ransomware-analysis |
https://awakesecurity.com/blog/threat-hunting-for-avaddon-ransomware/ |
https://docs.google.com/spreadsheets/d/1MI8Z2tBhmqQ5X8Wf_ozv3dVjz5sJOs-3 |
https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf |
https://ke-la.com/how-ransomware-gangs-find-new-monetization-schemes-and-evolve-in-marketing/ |
https://labs.sentinelone.com/avaddon-raas-breaks-public-decryptor-continues-on-rampage/ |
https://medium.com/s2wlab/quick-analysis-of-haron-ransomware-feat-avaddon-and-thanos-1ebb70f64dc4 |
https://medium.com/s2wlab/w4-jan-en-story-of-the-week-ransomware-on-the-darkweb-7595544363b1 |
https://news.sophos.com/en-us/2022/03/17/the-ransomware-threat-intelligence-center/ |
https://public.intel471.com/blog/ransomware-as-a-service-2020-ryuk-maze-revil-egregor-doppelpaymer/ |
https://symantec.broadcom.com/hubfs/The_Ransomware_Threat_September_2021.pdf |
https://therecord.media/avaddon-ransomware-operation-shuts-down-and-releases-decryption-keys/ |
https://therecord.media/darkside-ransomware-gang-says-it-lost-control-of-its-servers-money-a-day-after-biden-threat/ |
https://threatconnect.com/blog/threatconnect-research-roundup-probable-sandworm-infrastructure |
https://twitter.com/Securityinbits/status/1271065316903120902 |
https://twitter.com/dk_samper/status/1348560784285167617 |
https://vulnerability.ch/2021/04/ransomware-and-date-leak-site-publication-time-analysis/ |
https://www.advanced-intel.com/post/the-rise-demise-of-multi-million-ransomware-business-empire |
https://www.bleepingcomputer.com/news/security/another-ransomware-now-uses-ddos-attacks-to-force-victims-to-pay/ |
https://www.bleepingcomputer.com/news/security/avaddon-ransomware-shuts-down-and-releases-decryption-keys/ |
https://www.connectwise.com/resources/avaddon-profile |
https://www.coveware.com/blog/ransomware-attack-vectors-shift-as-new-software-vulnerability-exploits-abound |
https://www.cronup.com/post/de-ataque-con-malware-a-incidente-de-ransomware |
https://www.crowdstrike.com/blog/big-game-hunting-on-the-rise-again-according-to-ecrime-index/ |
https://www.crowdstrike.com/blog/how-big-game-hunting-ttps-shifted-after-darkside-pipeline-attack/ |
https://www.cyber.gov.au/sites/default/files/2021-05/2021-003%20Ongoing%20campaign%20using%20Avaddon%20Ransomware%20-%2020210508.pdf |
https://www.cyborgsecurity.com/cyborg_labs/hunting-ransomware-inhibiting-system-backup-or-recovery/ |
https://www.hornetsecurity.com/en/security-information/avaddon-from-seeking-affiliates-to-in-the-wild-in-2-days/ |
https://www.hornetsecurity.com/en/security-informationen-en/leakware-ransomware-hybrid-attacks/ |
https://www.mandiant.com/resources/chasing-avaddon-ransomware |
https://www.pwc.co.uk/issues/cyber-security-services/insights/what-is-behind-ransomware-attacks-increase.html |
https://www.splunk.com/en_us/blog/security/gone-in-52-seconds-and-42-minutes-a-comparative-analysis-of-ransomware-encryption-speed.html |
https://www.splunk.com/en_us/pdfs/resources/whitepaper/an-empirically-comparative-analysis-of-ransomware-binaries.pdf |
https://www.swascan.com/it/avaddon-ransomware/ |
https://www.tgsoft.it/files/report/download.asp?id=568531345 |
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-report-avaddon-and-new-techniques-emerge-industrial-sector-targeted |
https://www.welivesecurity.com/la-es/2021/05/31/ransomware-avaddon-principales-caracteristicas/ |
https://www.zdnet.com/article/the-malware-that-usually-installs-ransomware-and-you-need-to-remove-right-away/ |