Click here to download all references as Bib-File.•
| 2019-03-28
            
            ⋅
            
            Malware Explorer Blog
            ⋅ 10 Years Since Ghostnet Gh0stnet | 
| 2017-10-05
            
            ⋅
            
            FireEye
            ⋅ Significant FormBook Distribution Campaigns Impacting the U.S. and South Korea Formbook | 
| 2016-03-28
            
            ⋅
            
            FireEye
            ⋅ TREASUREHUNT: A Custom POS Malware Tool TreasureHunter | 
| 2015-05-23
            
            ⋅
            
            FireEye
            ⋅ NitlovePOS: Another New POS Malware nitlove | 
| 2014-10-06
            
            ⋅
            
            FireEye
            ⋅ Data Theft in Aisle 9: A FireEye Look at Threats to Retailers | 
| 2014-08-13
            
            ⋅
            
            FireEye
            ⋅ OPERATION SAFFRON ROSE Flying Kitten | 
| 2014-07-31
            
            ⋅
            
            FireEye
            ⋅ Spy of the Tiger paladin APT24 | 
| 2014-07-09
            
            ⋅
            
            FireEye
            ⋅ BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems BrutPOS | 
| 2014-02-19
            
            ⋅
            
            FireEye
            ⋅ XtremeRAT: Nuisance or Threat? Xtreme RAT | 
| 2013-12-12
            
            ⋅
            
            FireEye Inc
            ⋅ OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs Tidepool APT15 | 
| 2013-09-21
            
            ⋅
            
            FireEye
            ⋅ Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog APT17 | 
| 2013-09-21
            
            ⋅
            
            FireEye
            ⋅ Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog | 
| 2013-09-06
            
            ⋅
            
            FireEye
            ⋅ Evasive Tactics: Taidoor taidoor Taleret | 
| 2013-08-23
            
            ⋅
            
            FireEye
            ⋅ Operation Molerats: Middle East Cyber Attacks Using Poison Ivy Poison Ivy Molerats | 
| 2013-08-12
            
            ⋅
            
            FireEye
            ⋅ Survival of the Fittest: New York Times Attackers Evolve Quickly yayih | 
| 2013-05-20
            
            ⋅
            
            Trend Micro
            ⋅ Safe - A Targeted Threat SafeNet | 
| 2013-01-01
            
            ⋅
            
            Trend Micro
            ⋅ FAKEM RAT Terminator RAT | 
| 2012-10-23
            
            ⋅
            
            Trend Micro
            ⋅ Detecting APT Activity with Network Traffic Analysis Enfal Gh0stnet Nitro sykipot taidoor | 
| 2011-10-31
            
            ⋅
            
            Trend Micro
            ⋅ The Significance of the "Nitro" Attacks Nitro |