Click here to download all references as Bib-File.•
2015-12-16
⋅
ESET Research
⋅
Nemucod malware spreads ransomware Teslacrypt around the world TeslaCrypt |
2015-11-11
⋅
ESET Research
⋅
Operation Buhtrap malware distributed via ammyy.com BuhTrap |
2015-09-08
⋅
ESET Research
⋅
Carbanak gang is back and packing new guns DRIFTPIN |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-10
⋅
ESET Research
⋅
Sednit APT Group Meets Hacking Team |
2015-05-26
⋅
ESET Research
⋅
Moose – the router worm with an appetite for social networks Moose |
2015-05-01
⋅
ESET Research
⋅
CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails Banload |
2015-04-29
⋅
ESET Research
⋅
Unboxing Linux/Mumblehard: Muttering spam from your servers |
2015-04-28
⋅
ESET Research
⋅
Unboxing Linux/Mumblehard: Muttering spam from your servers Mumblehard |
2015-04-09
⋅
ESET Research
⋅
Operation Buhtrap, the trap for Russian accountants Buhtrap BuhTrap |
2015-03-09
⋅
ESET Research
⋅
CryptoFortress mimics TorrentLocker but is a different ransomware CryptoFortress |
2015-03-05
⋅
ESET Research
⋅
Casper Malware: After Babar and Bunny, Another Espionage Cartoon Casper |
2014-12-22
⋅
ESET Research
⋅
Virlock: First Self‑Reproducing Ransomware is also a Shape Shifter VirLock |
2014-11-12
⋅
ESET Research
⋅
Korplug military targeted attacks: Afghanistan & Tajikistan DarkStRat |
2014-10-15
⋅
ESET Research
⋅
Operation Windigo: “Good job, ESET!” says malware author Ebury |
2014-10-14
⋅
ESET Research
⋅
CVE‑2014‑4114: Details on August BlackEnergy PowerPoint Campaigns BlackEnergy |
2014-03-18
⋅
ESET Research
⋅
Operation Windigo – the vivisection of a large Linux server‑side credential‑stealing malware campaign Boaxxe Glupteba |
2014-03-01
⋅
ESET Research
⋅
OPERATION WINDIGO Ebury |
2014-02-21
⋅
ESET Research
⋅
An In‑depth Analysis of Linux/Ebury Ebury |