Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-05-26Palo Alto Networks Unit 42Robert Falcone, Bryan Lee
@online{falcone:20160526:oilrig:89b6b4d, author = {Robert Falcone and Bryan Lee}, title = {{The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor}}, date = {2016-05-26}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/}, language = {English}, urldate = {2019-12-20} } The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor
Helminth
2016-05-24Palo Alto Networks Unit 42Josh Grunzweig, Mike Scott, Bryan Lee
@online{grunzweig:20160524:new:d1cd669, author = {Josh Grunzweig and Mike Scott and Bryan Lee}, title = {{New Wekby Attacks Use DNS Requests As Command and Control Mechanism}}, date = {2016-05-24}, organization = {Palo Alto Networks Unit 42}, url = {http://researchcenter.paloaltonetworks.com/2016/05/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/}, language = {English}, urldate = {2019-12-20} } New Wekby Attacks Use DNS Requests As Command and Control Mechanism
Roseam
2016-05-22Palo Alto Networks Unit 42Micah Yates, Mike Scott, Brandon Levene, Jen Miller-Osborn, Tom Keigher
@online{yates:20160522:operation:9cfd4ae, author = {Micah Yates and Mike Scott and Brandon Levene and Jen Miller-Osborn and Tom Keigher}, title = {{Operation Ke3chang Resurfaces With New TidePool Malware}}, date = {2016-05-22}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/operation-ke3chang-resurfaces-with-new-tidepool-malware/}, language = {English}, urldate = {2020-01-06} } Operation Ke3chang Resurfaces With New TidePool Malware
Mirage
2016-05-22Palo Alto Networks Unit 42Micah Yates, Mike Scott, Brandon Levene, Jen Miller-Osborn, Tom Keigher
@online{yates:20160522:operation:2e8f4a8, author = {Micah Yates and Mike Scott and Brandon Levene and Jen Miller-Osborn and Tom Keigher}, title = {{Operation Ke3chang Resurfaces With New TidePool Malware}}, date = {2016-05-22}, organization = {Palo Alto Networks Unit 42}, url = {http://researchcenter.paloaltonetworks.com/2016/05/operation-ke3chang-resurfaces-with-new-tidepool-malware/}, language = {English}, urldate = {2019-12-20} } Operation Ke3chang Resurfaces With New TidePool Malware
Tidepool
2016-05-09Palo Alto Networks Unit 42Kaoru Hayashi, Vicky Ray
@online{hayashi:20160509:krbanker:c59923f, author = {Kaoru Hayashi and Vicky Ray}, title = {{KRBanker Targets South Korea Through Adware and Exploit Kits}}, date = {2016-05-09}, organization = {Palo Alto Networks Unit 42}, url = {http://researchcenter.paloaltonetworks.com/2016/05/unit42-krbanker-targets-south-korea-through-adware-and-exploit-kits-2/}, language = {English}, urldate = {2019-12-20} } KRBanker Targets South Korea Through Adware and Exploit Kits
KrBanker
2016-05-02Palo Alto Networks Unit 42Tomer Bar, Simon Conant
@online{bar:20160502:prince:cfd5940, author = {Tomer Bar and Simon Conant}, title = {{Prince of Persia: Infy Malware Active In Decade of Targeted Attacks}}, date = {2016-05-02}, organization = {Palo Alto Networks Unit 42}, url = {http://researchcenter.paloaltonetworks.com/2016/05/prince-of-persia-infy-malware-active-in-decade-of-targeted-attacks/}, language = {English}, urldate = {2020-04-06} } Prince of Persia: Infy Malware Active In Decade of Targeted Attacks
Infy Infy
2016-05-02Palo Alto Networks Unit 42Tomer Bar, Simon Conant
@online{bar:20160502:prince:8b14d7f, author = {Tomer Bar and Simon Conant}, title = {{Prince of Persia: Infy Malware Active In Decade of Targeted Attacks}}, date = {2016-05-02}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2016/05/prince-of-persia-infy-malware-active-in-decade-of-targeted-attacks/}, language = {English}, urldate = {2019-12-20} } Prince of Persia: Infy Malware Active In Decade of Targeted Attacks
Infy
2016-05-02Palo Alto Networks Unit 42Tomer Bar, Simon Conant
@online{bar:20160502:prince:7769673, author = {Tomer Bar and Simon Conant}, title = {{Prince of Persia: Infy Malware Active In Decade of Targeted Attacks}}, date = {2016-05-02}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/prince-of-persia-infy-malware-active-in-decade-of-targeted-attacks/}, language = {English}, urldate = {2020-01-06} } Prince of Persia: Infy Malware Active In Decade of Targeted Attacks
Infy
2016-04-22Palo Alto Networks Unit 42Micah Yates, Mike Scott, Brandon Levene, Jen Miller-Osborn
@online{yates:20160422:new:249e32b, author = {Micah Yates and Mike Scott and Brandon Levene and Jen Miller-Osborn}, title = {{New Poison Ivy RAT Variant Targets Hong Kong Pro-Democracy Activists}}, date = {2016-04-22}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2016/04/unit42-new-poison-ivy-rat-variant-targets-hong-kong-pro-democracy-activists/}, language = {English}, urldate = {2019-12-20} } New Poison Ivy RAT Variant Targets Hong Kong Pro-Democracy Activists
Poison Ivy
2016-03-25Palo Alto Networks Unit 42Robert Falcone, Simon Conant
@online{falcone:20160325:projectm:afcff3a, author = {Robert Falcone and Simon Conant}, title = {{ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe}}, date = {2016-03-25}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe}, language = {English}, urldate = {2020-01-10} } ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe
Bozok Operation C-Major
2016-03-14Palo Alto Networks Unit 42Josh Grunzweig, Robert Falcone, Bryan Lee
@online{grunzweig:20160314:digital:b6ddc60, author = {Josh Grunzweig and Robert Falcone and Bryan Lee}, title = {{Digital Quartermaster Scenario Demonstrated in Attacks Against the Mongolian Government}}, date = {2016-03-14}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2016/03/digital-quartermaster-scenario-demonstrated-in-attacks-against-the-mongolian-government/}, language = {English}, urldate = {2019-12-20} } Digital Quartermaster Scenario Demonstrated in Attacks Against the Mongolian Government
BBSRAT CMSTAR
2016-03-11Palo Alto Networks Unit 42Josh Grunzweig, Brandon Levene
@online{grunzweig:20160311:powersniff:ca6c14f, author = {Josh Grunzweig and Brandon Levene}, title = {{PowerSniff Malware Used in Macro-based Attacks}}, date = {2016-03-11}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/powersniff-malware-used-in-macro-based-attacks/}, language = {English}, urldate = {2020-01-08} } PowerSniff Malware Used in Macro-based Attacks
2016-03-06Palo Alto Networks Unit 42Claud Xiao
@online{xiao:20160306:new:d8aab8e, author = {Claud Xiao}, title = {{New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer}}, date = {2016-03-06}, organization = {Palo Alto Networks Unit 42}, url = {http://researchcenter.paloaltonetworks.com/2016/03/new-os-x-ransomware-keranger-infected-transmission-bittorrent-client-installer/}, language = {English}, urldate = {2019-12-20} } New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer
KeRanger
2016-02-29Palo Alto Networks Unit 42Vicky Ray, Kaoru Hayashi
@online{ray:20160229:new:3df3c12, author = {Vicky Ray and Kaoru Hayashi}, title = {{New Malware ‘Rover’ Targets Indian Ambassador to Afghanistan}}, date = {2016-02-29}, organization = {Palo Alto Networks Unit 42}, url = {http://researchcenter.paloaltonetworks.com/2016/02/new-malware-rover-targets-indian-ambassador-to-afghanistan/}, language = {English}, urldate = {2019-12-20} } New Malware ‘Rover’ Targets Indian Ambassador to Afghanistan
Rover
2016-02-25Palo Alto Networks Unit 42Jeff White
@online{white:20160225:keybase:676bd3f, author = {Jeff White}, title = {{KeyBase Threat Grows Despite Public Takedown: A Picture is Worth a Thousand Words}}, date = {2016-02-25}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/keybase-threat-grows-despite-public-takedown-a-picture-is-worth-a-thousand-words/}, language = {English}, urldate = {2020-01-10} } KeyBase Threat Grows Despite Public Takedown: A Picture is Worth a Thousand Words
KeyBase
2016-02-18Palo Alto Networks Unit 42Cong Zheng, Claud Xiao, Zhi Xu
@online{zheng:20160218:new:c8ee05b, author = {Cong Zheng and Claud Xiao and Zhi Xu}, title = {{New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom}}, date = {2016-02-18}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2016/02/new-android-trojan-xbot-phishes-credit-cards-and-bank-accounts-encrypts-devices-for-ransom/}, language = {English}, urldate = {2019-12-20} } New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom
Xbot
2016-02-12Palo Alto Networks Unit 42Bryan Lee, Rob Downs
@online{lee:20160212:look:4113ea1, author = {Bryan Lee and Rob Downs}, title = {{A Look Into Fysbis: Sofacy’s Linux Backdoor}}, date = {2016-02-12}, organization = {Palo Alto Networks Unit 42}, url = {http://researchcenter.paloaltonetworks.com/2016/02/a-look-into-fysbis-sofacys-linux-backdoor/}, language = {English}, urldate = {2019-12-20} } A Look Into Fysbis: Sofacy’s Linux Backdoor
X-Agent
2016-02-12Palo Alto Networks Unit 42Bryan Lee, Rob Downs
@online{lee:20160212:look:1483b5a, author = {Bryan Lee and Rob Downs}, title = {{A Look Into Fysbis: Sofacy’s Linux Backdoor}}, date = {2016-02-12}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/a-look-into-fysbis-sofacys-linux-backdoor/}, language = {English}, urldate = {2020-01-13} } A Look Into Fysbis: Sofacy’s Linux Backdoor
X-Agent
2016-02-03Palo Alto Networks Unit 42Robert Falcone, Jen Miller-Osborn
@online{falcone:20160203:emissary:99f3e21, author = {Robert Falcone and Jen Miller-Osborn}, title = {{Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It to Evolve?}}, date = {2016-02-03}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2016/02/emissary-trojan-changelog-did-operation-lotus-blossom-cause-it-to-evolve/}, language = {English}, urldate = {2019-12-20} } Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It to Evolve?
Elise
2016-02-03Palo Alto Networks Unit 42Robert Falcone, Jen Miller-Osborn
@online{falcone:20160203:emissary:704f38b, author = {Robert Falcone and Jen Miller-Osborn}, title = {{Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It to Evolve?}}, date = {2016-02-03}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/emissary-trojan-changelog-did-operation-lotus-blossom-cause-it-to-evolve/}, language = {English}, urldate = {2021-02-04} } Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It to Evolve?
Emissary