Click here to download all references as Bib-File.•
2015-12-16
⋅
FireEye
⋅
The EPS Awakens IRONHALO APT16 |
2015-08-05
⋅
Black Hat
⋅
Gameover Zeus – Bad Guys and Backends Gameover P2P |
2015-05-07
⋅
G Data
⋅
Dissecting the “Kraken” Laziok |
2015-03-24
⋅
Trend Micro
⋅
Operation Woolen-Goldfish: When Kittens Go Phishing Ghole Woolger |
2015-03-19
⋅
Trend Micro
⋅
Operation WOOLEN-GOLDFISH: When Kittens Go Phishing Ghole Woolger |
2014-11-27
⋅
Trend Micro
⋅
New PoS Malware Kicks off Holiday Shopping Weekend GetMyPass |
2014-10-14
⋅
ESET Research
⋅
CVE‑2014‑4114: Details on August BlackEnergy PowerPoint Campaigns BlackEnergy |
2014-05-13
⋅
G Data
⋅
Uroburos rootkit: Belgian Foreign Ministry stricken Uroburos |
2014-03-06
⋅
Trend Micro
⋅
The Siesta Campaign: A New Targeted Attack Awakens APT1 |
2013-12-12
⋅
FireEye Inc
⋅
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs Tidepool APT15 |
2010-03-03
⋅
Secureworks
⋅
BlackEnergy Version 2 Threat Analysis BlackEnergy |
2007-10-01
⋅
Arbor Networks
⋅
BlackEnergy DDoS Bot Analysis BlackEnergy |
2007-04-03
⋅
USENIX
⋅
A Case Study of the Rustock Rootkit and Spam Bot Rustock |