Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-06-09MicrosoftMicrosoft Defender ATP Research Team
@online{team:20160609:reverseengineering:6199f8b, author = {Microsoft Defender ATP Research Team}, title = {{Reverse-engineering DUBNIUM}}, date = {2016-06-09}, organization = {Microsoft}, url = {https://blogs.technet.microsoft.com/mmpc/2016/06/09/reverse-engineering-dubnium-2}, language = {English}, urldate = {2020-01-06} } Reverse-engineering DUBNIUM
DarkHotel
2016-06-09MicrosoftJeong Wook Oh
@online{oh:20160609:reverseengineering:e26dd54, author = {Jeong Wook Oh}, title = {{Reverse-engineering DUBNIUM}}, date = {2016-06-09}, organization = {Microsoft}, url = {https://blogs.technet.microsoft.com/mmpc/2016/06/09/reverse-engineering-dubnium-2/3/}, language = {English}, urldate = {2019-10-13} } Reverse-engineering DUBNIUM
DarkHotel
2016-04-26MicrosoftMicrosoft Defender ATP Research Team
@online{team:20160426:digging:90e644b, author = {Microsoft Defender ATP Research Team}, title = {{Digging deep for PLATINUM}}, date = {2016-04-26}, organization = {Microsoft}, url = {https://blogs.technet.microsoft.com/mmpc/2016/04/26/digging-deep-for-platinum/}, language = {English}, urldate = {2020-01-06} } Digging deep for PLATINUM
PLATINUM
2016-04-26MicrosoftWindows Defender Advanced Threat Hunting Team
@techreport{team:20160426:platinum:6d71086, author = {Windows Defender Advanced Threat Hunting Team}, title = {{PLATINUM Targeted attacks in South and Southeast Asia}}, date = {2016-04-26}, institution = {Microsoft}, url = {http://download.microsoft.com/download/2/2/5/225BFE3E-E1DE-4F5B-A77B-71200928D209/Platinum%20feature%20article%20-%20Targeted%20attacks%20in%20South%20and%20Southeast%20Asia%20April%202016.pdf}, language = {English}, urldate = {2020-01-13} } PLATINUM Targeted attacks in South and Southeast Asia
AMTsol PLATINUM
2015-11-20MicrosoftMicrosoft
@techreport{microsoft:20151120:microsoft:d41c5ad, author = {Microsoft}, title = {{Microsoft Security Intelligence Report Volume 19}}, date = {2015-11-20}, institution = {Microsoft}, url = {http://download.microsoft.com/download/4/4/C/44CDEF0E-7924-4787-A56A-16261691ACE3/Microsoft_Security_Intelligence_Report_Volume_19_English.pdf}, language = {English}, urldate = {2020-01-13} } Microsoft Security Intelligence Report Volume 19
XTunnel
2015-09-08FireEyeFireEye
@techreport{fireeye:20150908:two:c836c9a, author = {FireEye}, title = {{Two for One: Microsoft Office Encapsulated PostScriptand Windows Privilege Escalation Zero-Days}}, date = {2015-09-08}, institution = {FireEye}, url = {https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/twoforonefinal.pdf}, language = {English}, urldate = {2020-01-20} } Two for One: Microsoft Office Encapsulated PostScriptand Windows Privilege Escalation Zero-Days
REDSALT
2015-05FireEyeFireEye
@techreport{fireeye:201505:hiding:8695fc2, author = {FireEye}, title = {{HIDING IN PLAIN SIGHT: FIREEYE AND MICROSOFT EXPOSE OBFUSCATION TACTIC}}, date = {2015-05}, institution = {FireEye}, url = {https://www2.fireeye.com/rs/fireye/images/APT17_Report.pdf}, language = {English}, urldate = {2019-12-19} } HIDING IN PLAIN SIGHT: FIREEYE AND MICROSOFT EXPOSE OBFUSCATION TACTIC
BLACKCOFFEE
2014-05-16SecureworksParam Singh
@online{singh:20140516:campaign:109ccf9, author = {Param Singh}, title = {{APT Campaign Leverages the Cueisfry Trojan and Microsoft Word Vulnerability CVE-2014-1761}}, date = {2014-05-16}, organization = {Secureworks}, url = {https://www.secureworks.com/blog/apt-campaign-leverages-the-cueisfry-trojan-and-microsoft-word-vulnerability-cve-2014-1761}, language = {English}, urldate = {2019-12-17} } APT Campaign Leverages the Cueisfry Trojan and Microsoft Word Vulnerability CVE-2014-1761
Cueisfry
2013-02-22MicrosoftMicrosoft Security Response Center
@online{center:20130222:recent:b3d3f80, author = {Microsoft Security Response Center}, title = {{Recent Cyberattacks}}, date = {2013-02-22}, organization = {Microsoft}, url = {https://blogs.technet.microsoft.com/msrc/2013/02/22/recent-cyberattacks/}, language = {English}, urldate = {2019-12-20} } Recent Cyberattacks
WildNeutron
2013-02-22MicrosoftJeffrey Meisner
@online{meisner:20130222:bamital:68e57a9, author = {Jeffrey Meisner}, title = {{Bamital Botnet Takedown Is Successful; Cleanup Underway}}, date = {2013-02-22}, organization = {Microsoft}, url = {https://blogs.microsoft.com/blog/2013/02/22/bamital-botnet-takedown-is-successful-cleanup-underway/}, language = {English}, urldate = {2020-01-08} } Bamital Botnet Takedown Is Successful; Cleanup Underway
Bamital
2012-09-13MicrosoftRichard Domingues Boscovich
@online{boscovich:20120913:microsoft:da601a2, author = {Richard Domingues Boscovich}, title = {{Microsoft Disrupts the Emerging Nitol Botnet Being Spread through an Unsecure Supply Chain}}, date = {2012-09-13}, organization = {Microsoft}, url = {https://blogs.technet.microsoft.com/microsoft_blog/2012/09/13/microsoft-disrupts-the-emerging-nitol-botnet-being-spread-through-an-unsecure-supply-chain/}, language = {English}, urldate = {2020-01-13} } Microsoft Disrupts the Emerging Nitol Botnet Being Spread through an Unsecure Supply Chain
Nitol
2011-08-27MicrosoftMatt McCormack
@online{mccormack:20110827:mortoa:3f5b3b0, author = {Matt McCormack}, title = {{Morto.A}}, date = {2011-08-27}, organization = {Microsoft}, url = {https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Worm:Win32/Morto.A}, language = {English}, urldate = {2020-01-06} } Morto.A
Morto
2011-05-19MicrosoftMicrosoft Security Intelligence
@online{intelligence:20110519:win32expiro:e6195d7, author = {Microsoft Security Intelligence}, title = {{Win32/Expiro}}, date = {2011-05-19}, organization = {Microsoft}, url = {https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32/Expiro}, language = {English}, urldate = {2022-02-16} } Win32/Expiro
Expiro
2011-03-28KrebsOnSecurityBrian Krebs
@online{krebs:20110328:microsoft:dab0119, author = {Brian Krebs}, title = {{Microsoft Hunting Rustock Controllers}}, date = {2011-03-28}, organization = {KrebsOnSecurity}, url = {https://krebsonsecurity.com/2011/03/microsoft-hunting-rustock-controllers/}, language = {English}, urldate = {2019-07-11} } Microsoft Hunting Rustock Controllers
Rustock
2011-03-08Microsoft Security IntelligenceMicrosoft
@online{microsoft:20110308:wormwin32yimfocaa:d2c4ecc, author = {Microsoft}, title = {{Worm:Win32/Yimfoca.A}}, date = {2011-03-08}, organization = {Microsoft Security Intelligence}, url = {https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Worm:Win32/Yimfoca.A}, language = {English}, urldate = {2019-12-17} } Worm:Win32/Yimfoca.A
Buzus
2010-07-14The AtlanticBenjamin Carlson
@online{carlson:20100714:who:7563adc, author = {Benjamin Carlson}, title = {{Who Was the 12th Russian Spy at Microsoft?}}, date = {2010-07-14}, organization = {The Atlantic}, url = {https://www.theatlantic.com/international/archive/2010/07/who-was-the-12th-russian-spy-at-microsoft/344876/}, language = {English}, urldate = {2021-04-19} } Who Was the 12th Russian Spy at Microsoft?