Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-05-01SophosSergei Shevchenko
VPNFilter Botnet - a SophosLabs Analysis
VPNFilter
2018-04-01SophosDorka Palotay, Peter Mackenzie
SamSam Ransomware Chooses Its Targets Carefully
SamSam
2018-04-01SophosDorka Palotay, Peter Mackenzie
SamSam Ransomware Chooses Its Targets Carefully
SamSam
2018-01-31Sophos Naked SecurityPaul Ducklin
What are “WannaMine” attacks, and how do I avoid them?
WannaMine
2017-06-26SophosBill Brenner
How Spora ransomware tries to fool antivirus
Spora
2017-02-27SophosTed Heppner
Betabot: Configuration Data Extraction
BetaBot
2016-02-29SophosPaul Ducklin
The “HawkEye” attack: how cybercrooks target small businesses for big money
HawkEye Keylogger
2015-11-02SophosSophos
Troj/Cryakl-B
Cryakl
2014-06-27SophosLabsGabor Szappanos
PlugX - The Next Generation
PlugX
2014-01-21Sophos Naked SecurityPaul Ducklin
Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack
Laoshu
2013-08-01MalwarebytesJoshua Cannell
Sophos Discovers ZeroAccess Using RLO
ZeroAccess
2013-03-05Sophos Naked SecurityAnand Ajjan
Russian ransomware takes advantage of Windows PowerShell
FTCODE
2012-11-27SophosSophos
Threat Description: Troj/Ployx-A
ployx
2012-11-13SophosGraham Cluley
New variant of Mac Trojan discovered, targeting Tibet
iMuler
2012-08-30SophosSophos
Troj/Binanen-B
Binanen
2011-04-16SophosSophos
Troj/Sasfis-O
Sasfis
2010-07-24SophosJames Wyke
Why won’t my sample run?
Zeus
2009-04-01Sophos LabsMike Wood, Niall Fitzgibbon
Conficker.C A Technical Analysis
2009-04-01Sophos LabsMike Wood, Niall Fitzgibbon
Conficker.C A Technical Analysis