Click here to download all references as Bib-File.•
2013-10-31
⋅
FireEye
⋅
Know Your Enemy: Tracking A Rapidly Evolving APT Actor Bozok Poison Ivy TEMPER PANDA |
2013-09-24
⋅
FireEye
⋅
Now You See Me - H-worm by Houdini Houdini |
2013-09-21
⋅
FireEye
⋅
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog APT17 |
2013-09-21
⋅
FireEye
⋅
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog |
2013-09-06
⋅
FireEye
⋅
Evasive Tactics: Taidoor taidoor Taleret |
2013-08-23
⋅
FireEye
⋅
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy Poison Ivy Molerats |
2013-08-12
⋅
FireEye
⋅
Survival of the Fittest: New York Times Attackers Evolve Quickly yayih |
2013-08-07
⋅
FireEye
⋅
Breaking Down the China Chopper Web Shell - Part I CHINACHOPPER |
2013-06-18
⋅
FireEye
⋅
Trojan.APT.Seinup Hitting ASEAN seinup |
2013-05-20
⋅
FireEye
⋅
Ready for Summer: The Sunshop Campaign 9002 RAT |
2013-04-01
⋅
FireEye
⋅
Trojan.APT.BaneChant: In-Memory Trojan That Observes for Multiple Mouse Clicks |
2013-02-28
⋅
FireEye
⋅
It's a Kind of Magic MiniDuke |
2013-02-20
⋅
FireEye
⋅
APT 1 Malware Arsenal Technical Annex bangat |
2013-02-19
⋅
FireEye
⋅
APT1: Exposing One of China’s Cyber Espionage Units APT1 |
2013-02-13
⋅
FireEye
⋅
The Number of the Beast ItaDuke |
2013-02-07
⋅
FireEye
⋅
LadyBoyle Comes to Town with a New Exploit 9002 RAT |
2013-01-01
⋅
FireEye
⋅
APTs By The Dozen: Dissecting Advanced Attacks Korlia |
2011-08-09
⋅
FireEye
⋅
Harnig is Back Harnig |
2011-03-22
⋅
FireEye
⋅
Harnig Botnet: a retreating army Harnig |
2010-12-14
⋅
FireEye
⋅
Leouncia - Yet Another Backdoor - Part 2 Leouncia |
2010-12-14
⋅
FireEye
⋅
Leouncia - Yet Another Backdoor |
2010-10-27
⋅
FireEye
⋅
Bredolab - It's not the size of the dog in the fight.. Bredolab |
2010-03-03
⋅
FireEye
⋅
Black Energy Crypto BlackEnergy |
2009-03-04
⋅
FireEye
⋅
‘Bancos’ - A Brazilian Crook bancos |
2008-11-26
⋅
FireEye
⋅
Technical details of Srizbi's domain generation algorithm Szribi |