Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-03-18ESET ResearchPierre-Marc Bureau
@online{bureau:20140318:operation:1b1bd17, author = {Pierre-Marc Bureau}, title = {{Operation Windigo – the vivisection of a large Linux server‑side credential‑stealing malware campaign}}, date = {2014-03-18}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2014/03/18/operation-windigo-the-vivisection-of-a-large-linux-server-side-credential-stealing-malware-campaign/}, language = {English}, urldate = {2019-11-14} } Operation Windigo – the vivisection of a large Linux server‑side credential‑stealing malware campaign
Boaxxe Glupteba
2014-03ESET ResearchOlivier Bilodeau, Pierre-Marc Bureau, Joan Calvet, Alexis Dorais-Joncas, Marc-Etienne M.Léveillé, Benjamin Vanheuverzwijn
@techreport{bilodeau:201403:operation:40b7f42, author = {Olivier Bilodeau and Pierre-Marc Bureau and Joan Calvet and Alexis Dorais-Joncas and Marc-Etienne M.Léveillé and Benjamin Vanheuverzwijn}, title = {{OPERATION WINDIGO}}, date = {2014-03}, institution = {ESET Research}, url = {https://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf}, language = {English}, urldate = {2020-01-08} } OPERATION WINDIGO
Ebury
2014-02-21ESET ResearchMarc-Etienne M.Léveillé
@online{mlveill:20140221:indepth:3ee584f, author = {Marc-Etienne M.Léveillé}, title = {{An In‑depth Analysis of Linux/Ebury}}, date = {2014-02-21}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2014/02/21/an-in-depth-analysis-of-linuxebury/}, language = {English}, urldate = {2019-11-14} } An In‑depth Analysis of Linux/Ebury
Ebury
2013-12-18ESET ResearchJean-Ian Boutin
@online{boutin:20131218:qadars:98a9a63, author = {Jean-Ian Boutin}, title = {{Qadars – a banking Trojan with the Netherlands in its sights}}, date = {2013-12-18}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2013/12/18/qadars-a-banking-trojan-with-the-netherlands-in-its-sights/}, language = {English}, urldate = {2019-11-14} } Qadars – a banking Trojan with the Netherlands in its sights
Qadars
2013-12-05ESET ResearchESET Research
@techreport{research:20131205:did:2e2631c, author = {ESET Research}, title = {{Did you sayAdvanced Persistent Threats?}}, date = {2013-12-05}, institution = {ESET Research}, url = {https://www.welivesecurity.com/wp-content/uploads/2014/01/Advanced-Persistent-Threats.pdf}, language = {English}, urldate = {2020-01-13} } Did you sayAdvanced Persistent Threats?
Terminator RAT
2013-09-25ESET ResearchPierre-Marc Bureau
@online{bureau:20130925:win32napolar:aba54b1, author = {Pierre-Marc Bureau}, title = {{Win32/Napolar – A new bot on the block}}, date = {2013-09-25}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2013/09/25/win32napolar-a-new-bot-on-the-block/}, language = {English}, urldate = {2019-11-14} } Win32/Napolar – A new bot on the block
Solarbot
2013-07-30ESET Researchwelivesecurity
@online{welivesecurity:20130730:versatile:30e5f2e, author = {welivesecurity}, title = {{Versatile and infectious: Win64/Expiro is a cross‑platform file infector}}, date = {2013-07-30}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2013/07/30/versatile-and-infectious-win64expiro-is-a-cross-platform-file-infector/}, language = {English}, urldate = {2022-02-14} } Versatile and infectious: Win64/Expiro is a cross‑platform file infector
Expiro
2013-05-02ESET ResearchStephen Cobb
@online{cobb:20130502:stealthiness:6579e26, author = {Stephen Cobb}, title = {{The stealthiness of Linux/Cdorked: a clarification}}, date = {2013-05-02}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2013/05/02/the-stealthiness-of-linuxcdorked-a-clarification/}, language = {English}, urldate = {2019-11-14} } The stealthiness of Linux/Cdorked: a clarification
CDorked
2013-04-26ESET ResearchPierre-Marc Bureau
@online{bureau:20130426:linuxcdorkeda:ab3e321, author = {Pierre-Marc Bureau}, title = {{Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole}}, date = {2013-04-26}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2013/04/26/linuxcdorked-new-apache-backdoor-in-the-wild-serves-blackhole/}, language = {English}, urldate = {2019-11-14} } Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole
CDorked
2013-03-13ESET ResearchAleksandr Matrosov
@online{matrosov:20130313:how:c50943e, author = {Aleksandr Matrosov}, title = {{How Theola malware uses a Chrome plugin for banking fraud}}, date = {2013-03-13}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2013/03/13/how-theola-malware-uses-a-chrome-plugin-for-banking-fraud/}, language = {English}, urldate = {2019-11-14} } How Theola malware uses a Chrome plugin for banking fraud
Sinowal
2013-02-04ESET ResearchAleksandr Matrosov
@online{matrosov:20130204:what:56f7bcb, author = {Aleksandr Matrosov}, title = {{What do Win32/Redyms and TDL4 have in common?}}, date = {2013-02-04}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2013/02/04/what-do-win32redyms-and-tdl4-have-in-common/}, language = {English}, urldate = {2019-11-14} } What do Win32/Redyms and TDL4 have in common?
Redyms
2013-01-24ESET ResearchSébastien Duquette
@online{duquette:20130124:linuxsshdoora:0b9dc3e, author = {Sébastien Duquette}, title = {{Linux/SSHDoor.A Backdoored SSH daemon that steals passwords}}, date = {2013-01-24}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2013/01/24/linux-sshdoor-a-backdoored-ssh-daemon-that-steals-passwords/}, language = {English}, urldate = {2019-11-14} } Linux/SSHDoor.A Backdoored SSH daemon that steals passwords
SSHDoor
2012-12-19ESET ResearchAleksandr Matrosov
@online{matrosov:20121219:win32spyranbyus:955d383, author = {Aleksandr Matrosov}, title = {{Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems}}, date = {2012-12-19}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2012/12/19/win32spy-ranbyus-modifying-java-code-in-rbs/}, language = {English}, urldate = {2019-11-14} } Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems
Ranbyus
2012-12-18ESET ResearchPierre-Marc Bureau
@online{bureau:20121218:malicious:c863bcf, author = {Pierre-Marc Bureau}, title = {{Malicious Apache module used for content injection: Linux/Chapro.A}}, date = {2012-12-18}, organization = {ESET Research}, url = {http://blog.eset.com/2012/12/18/malicious-apache-module-used-for-content-injection-linuxchapro-a}, language = {English}, urldate = {2019-12-20} } Malicious Apache module used for content injection: Linux/Chapro.A
Chapro
2012-07-13ESET ResearchAleksandr Matrosov
@online{matrosov:20120713:rovnix:7988101, author = {Aleksandr Matrosov}, title = {{Rovnix bootkit framework updated}}, date = {2012-07-13}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2012/07/13/rovnix-bootkit-framework-updated/}, language = {English}, urldate = {2019-11-14} } Rovnix bootkit framework updated
Rovnix
2012-06-05ESET ResearchAleksandr Matrosov
@online{matrosov:20120605:smartcard:88d7163, author = {Aleksandr Matrosov}, title = {{Smartcard vulnerabilities in modern banking malware}}, date = {2012-06-05}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2012/06/05/smartcard-vulnerabilities-in-modern-banking-malware/}, language = {English}, urldate = {2019-11-14} } Smartcard vulnerabilities in modern banking malware
Ranbyus
2012-03-16ESET ResearchAlexis Dorais-Joncas
@online{doraisjoncas:20120316:osximuler:badbc2e, author = {Alexis Dorais-Joncas}, title = {{OSX/Imuler updated: still a threat on Mac OS X}}, date = {2012-03-16}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2012/03/16/osximuler-updated-still-a-threat-on-mac-os-x/}, language = {English}, urldate = {2019-11-14} } OSX/Imuler updated: still a threat on Mac OS X
iMuler
2012-03-02ESET ResearchAleksandr Matrosov, Eugene Rodionov, Dmitry Volkov, David Harley
@techreport{matrosov:20120302:win32carberp:638558a, author = {Aleksandr Matrosov and Eugene Rodionov and Dmitry Volkov and David Harley}, title = {{Win32/Carberp: When You're in a Black Hole, Stop Digging}}, date = {2012-03-02}, institution = {ESET Research}, url = {https://cdn1.esetstatic.com/eset/US/resources/docs/white-papers/white-papers-win-32-carberp.pdf}, language = {English}, urldate = {2020-02-11} } Win32/Carberp: When You're in a Black Hole, Stop Digging
Carberp
2011-07-14ESET ResearchDavid Harley
@online{harley:20110714:cycbot:9e18833, author = {David Harley}, title = {{Cycbot: Ready to Ride}}, date = {2011-07-14}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2011/07/14/cycbot-ready-to-ride/}, language = {English}, urldate = {2019-11-14} } Cycbot: Ready to Ride
CycBot
2011-03-02ESET ResearchDavid Harley
@online{harley:20110302:tdl4:9071c3f, author = {David Harley}, title = {{TDL4 and Glupteba: Piggyback PiggyBugs}}, date = {2011-03-02}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2011/03/02/tdl4-and-glubteba-piggyback-piggybugs/}, language = {English}, urldate = {2019-11-14} } TDL4 and Glupteba: Piggyback PiggyBugs
Glupteba