Click here to download all references as Bib-File.•
2019-01-01
⋅
MITRE
⋅
Tool description: China Chopper CHINACHOPPER |
2018-12-02
⋅
Check Point
⋅
The Ransomware Doctor Without A Cure Dharma |
2018-11-01
⋅
Trend Micro
⋅
Perl-Based Shellbot Looks to Target Organizations via C&C Haiduc PerlBot |
2018-10-01
⋅
SANS Cyber Summit
⋅
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems, Forever Triton |
2018-09-10
⋅
Trend Micro
⋅
A Closer Look at the Locky Poser, PyLocky Ransomware PyLocky |
2018-09-02
⋅
Möbius Strip Reverse Engineering
⋅
Weekend Project: A Custom IDA Loader Module For The Hidden Bee Malware Family Hidden Bee |
2018-08-30
⋅
Malwarebytes
⋅
Reversing malware in a custom format: Hidden Bee elements Hidden Bee |
2018-08-08
⋅
Nozomi Networks
⋅
TRITON: The First ICS Cyber Attack on Safety Instrument Systems Triton |
2018-08-07
⋅
Dr.Web
⋅
Doctor Web discovered a clipper Trojan for Android Clipper |
2018-06-15
⋅
Bleeping Computer
⋅
Chinese Cyber-Espionage Group Hacked Government Data Center APT27 |
2018-06-13
⋅
Threatpost
⋅
Banco de Chile Wiper Attack Just a Cover for $10M SWIFT Heist Lazarus Group |
2018-06-13
⋅
Kaspersky Labs
⋅
LuckyMouse hits national data center to organize country-level waterholing campaign HyperBro APT27 |
2018-05-17
⋅
Minerva Labs
⋅
Analyzing an AZORult Attack – Evasion in a Cloak of Multiple Layers Azorult |
2018-04-13
⋅
NewSky Security
⋅
Understanding the IoT Hacker — A Conversation With Owari/Sora IoT Botnet Author Owari |
2018-03-30
⋅
Trend Micro
⋅
Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types Project Alice ATMitch Ploutus ATM Ripper ATM Skimer SUCEFUL Tyupkin |
2018-02-01
⋅
Bitdefender
⋅
Operation PZChao: a possible return of the Iron Tiger APT APT27 |
2018-01-24
⋅
Objective-See
⋅
Analyzing CrossRAT: A cross-platform implant, utilized in a global cyber-espionage campaign CrossRAT |
2018-01-17
⋅
Malwarebytes
⋅
A coin miner with a “Heaven’s Gate” Coinminer |
2018-01-13
⋅
The Washington Post
⋅
Russian military was behind ‘NotPetya’ cyberattack in Ukraine, CIA concludes EternalPetya |
2018-01-12
⋅
Stormshield
⋅
Analyzing an Agent Tesla campaign: from a word document to the attacker credentials Agent Tesla |