Click here to download all references as Bib-File.•
2018-08-21
⋅
Trend Micro
⋅
Operation Red Signature Targets South Korean Companies 9002 RAT PlugX Operation Red Signature |
2018-08-21
⋅
Trend Micro
⋅
Supply Chain Attack Operation Red Signature Targets South Korean Organizations 9002 RAT |
2018-08-01
⋅
SophosLabs
⋅
SamSam: The (Almost) Six Million Dollar Ransomware SamSam |
2018-05-17
⋅
Fortinet
⋅
A Wicked Family of Bots Owari |
2018-04-10
⋅
Github (vithakur)
⋅
schneiken Schneiken |
2018-04-01
⋅
Sophos
⋅
SamSam Ransomware Chooses Its Targets Carefully SamSam |
2018-03-13
⋅
Palo Alto Networks Unit 42
⋅
HenBox: The Chickens Come Home to Roost HenBox |
2017-12-19
⋅
Trustwave
⋅
BrickerBot mod_plaintext Analysis BrickerBot |
2017-12-08
⋅
RSA
⋅
GratefulPOS credit card stealing malware - just in time for the shopping season Grateful POS |
2017-09-18
⋅
ThreatConnect
⋅
Casting a Light on BlackEnergy BlackEnergy |
2017-07-03
⋅
ESET Research
⋅
BlackEnergy – what we really know about the notorious cyber attacks BlackEnergy |
2017-06-30
⋅
Kaspersky Labs
⋅
From BlackEnergy to ExPetr EternalPetya |
2017-05-09
⋅
Trend Micro
⋅
Persirai: New Internet of Things (IoT) Botnet Targets IP Cameras Persirai |
2017-04-03
⋅
Google
⋅
An Investigation of Chrysaor Malware on Android Chrysaor |
2017-04-03
⋅
Google
⋅
An investigation of Chrysaor Malware on Android Chrysaor |
2017-01-31
⋅
Malwarebytes
⋅
Locky Bart ransomware and backend server analysis Locky |
2016-12-20
⋅
Symantec
⋅
Backdoor.Pralice |
2016-01-28
⋅
Kaspersky Labs
⋅
BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents BlackEnergy |
2015-12-22
⋅
Johannes Bader's Blog
⋅
Kraken's two Domain Generation Algorithms Oderoor |
2015-12-21
⋅
FireEye
⋅
The EPS Awakens - Part 2 ELMER IRONHALO EvilPost |