Click here to download all references as Bib-File.•
2023-05-22
⋅
eSentire
⋅
The Hunt for VENOM SPIDER PART 2 VENOM SPIDER |
2023-04-26
⋅
eSentire
⋅
Gootloader Unloaded: Researchers Launch Multi-Pronged Offensive Against Gootloader, Cutting Off Traffic to Thousands of Gootloader Web Pages and Using the Operator’s Very Own Tactics to Protect End-Users GootLoader |
2023-01-24
⋅
eSentire
⋅
Unmasking Venom Spider More_eggs TerraPreter TerraLoader VenomLNK |
2013-07-31
⋅
Secureworks
⋅
Secrets of the Comfoo Masters Comfoo |
2011-08-03
⋅
Secureworks
⋅
HTran and the Advanced Persistent Threat HTran |
2010-03-03
⋅
Secureworks
⋅
BlackEnergy Version 2 Threat Analysis BlackEnergy |
2009-06-23
⋅
Secureworks
⋅
Virut Encryption Analysis Virut |
2008-10-15
⋅
Secureworks
⋅
The Return of Warezov Warezov |
2007-12-16
⋅
Secureworks
⋅
Pushdo - Analysis of a Modern Malware Distribution System Pushdo |
2007-12-04
⋅
Secureworks
⋅
Inside the "Ron Paul" Spam Botnet Szribi |
2007-01-09
⋅
Secureworks
⋅
A Rustock-ing Stuffer Rustock |