Click here to download all references as Bib-File.•
2015-04-28
⋅
ESET Research
⋅
Unboxing Linux/Mumblehard: Muttering spam from your servers Mumblehard |
2015-04-09
⋅
ESET Research
⋅
Operation Buhtrap, the trap for Russian accountants Buhtrap BuhTrap |
2015-03-09
⋅
ESET Research
⋅
CryptoFortress mimics TorrentLocker but is a different ransomware CryptoFortress |
2015-03-05
⋅
ESET Research
⋅
Casper Malware: After Babar and Bunny, Another Espionage Cartoon Casper |
2014-12-22
⋅
ESET Research
⋅
Virlock: First Self‑Reproducing Ransomware is also a Shape Shifter VirLock |
2014-11-12
⋅
ESET Research
⋅
Korplug military targeted attacks: Afghanistan & Tajikistan DarkStRat |
2014-10-15
⋅
ESET Research
⋅
Operation Windigo: “Good job, ESET!” says malware author Ebury |
2014-10-14
⋅
ESET Research
⋅
CVE‑2014‑4114: Details on August BlackEnergy PowerPoint Campaigns BlackEnergy |
2014-03-18
⋅
ESET Research
⋅
Operation Windigo – the vivisection of a large Linux server‑side credential‑stealing malware campaign Boaxxe Glupteba |
2014-03-01
⋅
ESET Research
⋅
OPERATION WINDIGO Ebury |
2014-02-21
⋅
ESET Research
⋅
An In‑depth Analysis of Linux/Ebury Ebury |
2013-12-18
⋅
ESET Research
⋅
Qadars – a banking Trojan with the Netherlands in its sights Qadars |
2013-12-05
⋅
ESET Research
⋅
Did you sayAdvanced Persistent Threats? Terminator RAT |
2013-09-25
⋅
ESET Research
⋅
Win32/Napolar – A new bot on the block Solarbot |
2013-09-09
⋅
ESET Research
⋅
HESPERBOT A New, Advanced Banking Trojan in the Wild HesperBot |
2013-07-30
⋅
ESET Research
⋅
Versatile and infectious: Win64/Expiro is a cross‑platform file infector Expiro |
2013-05-02
⋅
ESET Research
⋅
The stealthiness of Linux/Cdorked: a clarification CDorked |
2013-04-26
⋅
ESET Research
⋅
Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole CDorked |
2013-03-13
⋅
ESET Research
⋅
How Theola malware uses a Chrome plugin for banking fraud Sinowal |
2013-02-04
⋅
ESET Research
⋅
What do Win32/Redyms and TDL4 have in common? Redyms |