Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-12-14Australian Cyber Security CentreASD
Investigationreport: Compromise of an Australian companyvia their Managed Service Provider
PlugX RedLeaves
2018-12-14Trend MicroAliakbar Zahravi
Cybercriminals Use Malicious Memes that Communicate with Malware
Berbomthum
2018-12-05BotconfRémi Jullian
FORMBOOK In-depth malware analysis
Formbook
2018-10-01ThreatFabricThreatFabric
BianLian - from rags to riches, the malware dropper that had a dream
BianLian
2018-09-18CybereasonCybereason Nocturnus
VAI MALANDRA: A LOOK INTO THE LIFECYCLE OF BRAZILIAN FINANCIAL MALWARE: PART ONE
Overlay RAT
2018-09-04SecurityIntelligenceLimor Kessem, Maor Wiesen
CamuBot: New Financial Malware Targets Brazilian Banking Customers
CamuBot
2018-08-22Cisco TalosEdmund Brumaghin, Eric Kuhla, Holger Unterbrink, Lilia Gonzalez Medina
Picking Apart Remcos Botnet-In-A-Box
Remcos
2018-08-20ReversingMinds' Blog51ddh4r7h4
Advanced Brazilian Malware Analysis
N40
2018-07-26IEEE Symposium on Security and Privacy (SP)Alex C. Snoeren, Damon McCoy, Danny Yuxing Huang, Elie Bursztein, Jonathan Levin, Kirill Levchenko, Kylie McRoberts, Luca Invernizzi, Maxwell Matthaios Aliapoulios, Vector Guo Li
Tracking Ransomware End-to-end
Cerber Locky WannaCryptor
2018-07-11F5Julia Karpin
Tackling Gootkit's Traps
2018-06-26Cisco TalosAndrew Williams, Earl Carter, Edmund Brumaghin
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor
Thanatos Ransomware
2018-06-06Cisco TalosWilliam Largent
VPNFilter Update - VPNFilter exploits endpoints, targets new devices
VPNFilter
2018-05-15BSides DetroitKeven Murphy, Stefano Maccaglia
IR in Heterogeneous Environment
Korlia Poison Ivy
2018-04-24FireEyeEdson Sierra, Gerardo Iglesias
Metamorfo Campaigns Targeting Brazilian Users
Metamorfo
2018-04-12Kaspersky LabsGReAT
Operation Parliament, who is doing what?
Operation Parliament
2018-03-30Trend MicroDavid Sancho, Massimiliano Michenz, Numaan Huq
Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types
Project Alice ATMitch Ploutus ATM Ripper ATM Skimer SUCEFUL Tyupkin
2018-03-29StormshieldRémi Jullian
In-depth Formbook malware analysis – Obfuscation and process injection
Formbook
2018-03-09Adam Senft, Bill Marczak, Jakub Dalek, John Scott-Railton, Ron Deibert, Sarah McKune
Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?
StrongPity
2018-03-09Kaspersky LabsAlex Perekalin
Cloning chip-and-PIN cards: Brazilian job
Prilex
2018-01-12StormshieldRémi Jullian
Analyzing an Agent Tesla campaign: from a word document to the attacker credentials
Agent Tesla