Click here to download all references as Bib-File.•
2019-02-13
⋅
Department of Justice
⋅
Former U.S. Counterintelligence Agent Charged With Espionage on Behalf of Iran; Four Iranians Charged With a Cyber Campaign Targeting Her Former Colleagues Charming Kitten |
2019-02-01
⋅
Github (Zenexer)
⋅
Information about lnkr5, malware distributed via Chrome extensions LNKR |
2019-01-29
⋅
CodeWare
⋅
Phobos Ransomware, A Combo of CrySiS and Dharma Phobos |
2019-01-17
⋅
CyberArk
⋅
Qealler — The Silent Java Credential Thief Qealler |
2019-01-03
⋅
Cybereason
⋅
LOLbins and trojans: How the Ramnit Trojan spreads via sLoad in a cyberattack sLoad |
2019-01-01
⋅
Saudi Arabia CNA
⋅
Destructive Attack “DUSTMAN” Technical Report DUSTMAN |
2019-01-01
⋅
MITRE
⋅
Tool description: China Chopper CHINACHOPPER |
2018-12-02
⋅
Check Point
⋅
The Ransomware Doctor Without A Cure Dharma |
2018-11-01
⋅
Trend Micro
⋅
Perl-Based Shellbot Looks to Target Organizations via C&C Haiduc PerlBot |
2018-10-01
⋅
SANS Cyber Summit
⋅
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems, Forever Triton |
2018-09-10
⋅
Trend Micro
⋅
A Closer Look at the Locky Poser, PyLocky Ransomware PyLocky |
2018-09-02
⋅
Möbius Strip Reverse Engineering
⋅
Weekend Project: A Custom IDA Loader Module For The Hidden Bee Malware Family Hidden Bee |
2018-08-30
⋅
Malwarebytes
⋅
Reversing malware in a custom format: Hidden Bee elements Hidden Bee |
2018-08-08
⋅
Nozomi Networks
⋅
TRITON: The First ICS Cyber Attack on Safety Instrument Systems Triton |
2018-08-07
⋅
Dr.Web
⋅
Doctor Web discovered a clipper Trojan for Android Clipper |
2018-06-15
⋅
Bleeping Computer
⋅
Chinese Cyber-Espionage Group Hacked Government Data Center APT27 |
2018-06-13
⋅
Threatpost
⋅
Banco de Chile Wiper Attack Just a Cover for $10M SWIFT Heist Lazarus Group |
2018-06-13
⋅
Kaspersky Labs
⋅
LuckyMouse hits national data center to organize country-level waterholing campaign HyperBro APT27 |
2018-05-17
⋅
Minerva Labs
⋅
Analyzing an AZORult Attack – Evasion in a Cloak of Multiple Layers Azorult |
2018-04-13
⋅
NewSky Security
⋅
Understanding the IoT Hacker — A Conversation With Owari/Sora IoT Botnet Author Owari |