Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-01-28Kaspersky LabsGReAT
BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents
BlackEnergy
2015-12-22Johannes Bader's BlogJohannes Bader
Kraken's two Domain Generation Algorithms
Oderoor
2015-12-21FireEyeFireEye Threat Intelligence, Ryann Winters
The EPS Awakens - Part 2
ELMER IRONHALO EvilPost
2015-12-21FireEyeFireEye Threat Intelligence, Ryann Winters
The EPS Awakens - Part 2
ELMER IRONHALO EvilPost
2015-12-16FireEyeDan Caselden, Genwei Jiang, Ryann Winters
The EPS Awakens
IRONHALO APT16
2015-12-16FireEyeDan Caselden, Genwei Jiang, Ryann Winters
The EPS Awakens
IRONHALO APT16
2015-12-16FireEyeDan Caselden, Genwei Jiang, Ryann Winters
The EPS Awakens
IRONHALO APT16
2015-08-05Black HatElliott Peterson, Michael Sandee, Tillmann Werner
Gameover Zeus – Bad Guys and Backends
Gameover P2P
2015-08-05Black HatElliott Peterson, Michael Sandee, Tillmann Werner
Gameover Zeus – Bad Guys and Backends
Gameover P2P
2015-08-05Black HatElliott Peterson, Michael Sandee, Tillmann Werner
Gameover Zeus – Bad Guys and Backends
Gameover P2P
2015-05-07G DataG Data
Dissecting the “Kraken”
Laziok
2015-03-24Trend MicroCedric Pernet, Kenney Lu
Operation Woolen-Goldfish: When Kittens Go Phishing
Ghole Woolger
2015-03-19Trend MicroCedric Pernet, Kenney Lu
Operation WOOLEN-GOLDFISH: When Kittens Go Phishing
Ghole Woolger
2014-11-27Trend MicroAnthony Joe Melgarejo
New PoS Malware Kicks off Holiday Shopping Weekend
GetMyPass
2014-10-14ESET ResearchRobert Lipovsky
CVE‑2014‑4114: Details on August BlackEnergy PowerPoint Campaigns
BlackEnergy
2014-05-13G DataG Data
Uroburos rootkit: Belgian Foreign Ministry stricken
Uroburos
2014-03-06Trend MicroMaharlito Aquino
The Siesta Campaign: A New Targeted Attack Awakens
APT1
2013-12-12FireEye IncJames T. Bennett, Kenneth Geers, Mike Scott, Nart Villeneuve, Ned Moran, Thoufique Haq
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs
Tidepool APT15
2010-03-03SecureworksJoe Stewart
BlackEnergy Version 2 Threat Analysis
BlackEnergy
2007-10-01Arbor NetworksJose Nazario
BlackEnergy DDoS Bot Analysis
BlackEnergy
2007-04-03USENIXKen Chiang, Levi Lloyd
A Case Study of the Rustock Rootkit and Spam Bot
Rustock