| https://blog.cyble.com/2022/03/15/deep-dive-analysis-pandora-ransomware/ |
| https://cloudsek.com/technical-analysis-of-emerging-sophisticated-pandora-ransomware-group/ |
| https://dissectingmalwa.re/blog/pandora/ |
| https://kienmanowar.wordpress.com/2022/03/21/quicknote-analysis-of-pandora-ransomware/ |
| https://www.fortinet.com/blog/threat-research/Using-emulation-against-anti-reverse-engineering-techniques |
| https://www.fortinet.com/blog/threat-research/looking-inside-pandoras-box |
| https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself |
| https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/ |
| https://www.secureworks.com/research/bronze-starlight-ransomware-operations-use-hui-loader |