Click here to download all references as Bib-File.•
2015-01-01
⋅
Ruxcon
⋅
WHY ATTACKER TOOLSETS DO WHAT THEY DO Winnti |
2014-07-15
⋅
McAfee
⋅
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities APT24 |
2014-07-15
⋅
McAfee
⋅
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities PittyTiger RAT |
2014-02-15
⋅
McAfee
⋅
Examining Your Very Own Sefnit Trojan Mevade |
2013-03-21
⋅
McAfee
⋅
VSkimmer Botnet Targets Credit Card Payment Terminals vSkimmer |
2013-01-01
⋅
McAfee
⋅
Dissecting Operation Troy: Cyberespionage in South Korea httpdropper |
2012-09-18
⋅
Pastebin
⋅
QassamCyberFighters's Pastebin Cyber fighters of Izz Ad-Din Al Qassam |
2012-09-07
⋅
Symantec
⋅
The Elderwood Project 9002 RAT Beijing Group |
2012-09-06
⋅
Symantec
⋅
The Elderwood Project Beijing Group |
2012-04-05
⋅
McAfee
⋅
Darkshell DDOS Botnet Evolves With Variants DarkShell |
2012-01-01
⋅
CSIS Trend Micro
⋅
W32.Tinba (Tinybanker) The Turkish Incident Tinba |
2011-08-27
⋅
Microsoft
⋅
Morto.A Morto |
2011-06-29
⋅
Symantec
⋅
Inside a Back Door Attack Ghost RAT Dust Storm |
2011-06-29
⋅
Symantec
⋅
Inside a Back Door Attack Dust Storm |
2011-02-10
⋅
McAfee
⋅
Global Energy Cyberattacks: “Night Dragon” Night Dragon |
2009-12-22
⋅
Symantec
⋅
Qakbot, Data Thief Unmasked: Part II QakBot |
2009-05-22
⋅
Trend Micro
⋅
Pushdo / Cutwail Botnet Pushdo |