Click here to download all references as Bib-File.•
| 2019-03-28
⋅
Malware Explorer Blog
⋅
10 Years Since Ghostnet Gh0stnet |
| 2017-10-05
⋅
FireEye
⋅
Significant FormBook Distribution Campaigns Impacting the U.S. and South Korea Formbook |
| 2016-03-28
⋅
FireEye
⋅
TREASUREHUNT: A Custom POS Malware Tool TreasureHunter |
| 2015-05-23
⋅
FireEye
⋅
NitlovePOS: Another New POS Malware nitlove |
| 2014-10-06
⋅
FireEye
⋅
Data Theft in Aisle 9: A FireEye Look at Threats to Retailers |
| 2014-08-13
⋅
FireEye
⋅
OPERATION SAFFRON ROSE Flying Kitten |
| 2014-07-31
⋅
FireEye
⋅
Spy of the Tiger paladin APT24 |
| 2014-07-09
⋅
FireEye
⋅
BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems BrutPOS |
| 2014-02-19
⋅
FireEye
⋅
XtremeRAT: Nuisance or Threat? Xtreme RAT |
| 2013-12-12
⋅
FireEye Inc
⋅
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs Tidepool APT15 |
| 2013-09-21
⋅
FireEye
⋅
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog APT17 |
| 2013-09-21
⋅
FireEye
⋅
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog |
| 2013-09-06
⋅
FireEye
⋅
Evasive Tactics: Taidoor taidoor Taleret |
| 2013-08-23
⋅
FireEye
⋅
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy Poison Ivy Molerats |
| 2013-08-12
⋅
FireEye
⋅
Survival of the Fittest: New York Times Attackers Evolve Quickly yayih |
| 2013-05-20
⋅
Trend Micro
⋅
Safe - A Targeted Threat SafeNet |
| 2013-01-01
⋅
Trend Micro
⋅
FAKEM RAT Terminator RAT |
| 2012-10-23
⋅
Trend Micro
⋅
Detecting APT Activity with Network Traffic Analysis Enfal Gh0stnet Nitro sykipot taidoor |
| 2011-10-31
⋅
Trend Micro
⋅
The Significance of the "Nitro" Attacks Nitro |