Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-05-05BitdefenderAdrian Schipur, Alexandru Maximciuc, Bogdan Botezatu, Cristina Vatamanu
Inside Netrepser – a JavaScript-based Targeted Attack
Netrepser
2017-05-03FireEyeDJ Palombo, Jon Erickson, Matthew McWhirt
To SDB, Or Not To SDB: FIN7 Leveraging Shim Databases for Persistence
FIN7
2017-02-14FortinetFloser Bacurio, Joie Salvio
REMCOS: A New RAT In The Wild
Remcos
2016-09-27Best Security ResearchAlex Dimchev
New Voldemort/Nagini Ransomware Virus Infection
Nagini
2016-09-23SecurityIntelligenceDave McMillen
Dissecting a Hacktivist’s DDoS Tool: Saphyra Revealed
Saphyra
2016-09-07Twitter (smoothimpact)Kris McConkey
Tweet with hashes on APT3
APT3 Keylogger
2016-07-21McAfeeMohinder Gill, Oliver Devane
Phishing Attacks Employ Old but Effective Password Stealer
ISR Stealer
2015-10-01Check PointAliaksandr Trafimchuk, Stanislav Skuratovich
Digging for Groundhogs: Holes in your Linux server
XOR DDoS
2015-04-14Youtube (Kaspersky)Kris McConkey
Following APT OpSec failures
BLACKCOFFEE Mangzamel APT17
2015-01-01RuxconMatt McCormack
WHY ATTACKER TOOLSETS DO WHAT THEY DO
Winnti
2014-07-15McAfeeMcAfee
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
APT24
2014-07-15McAfeeMcAfee
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
PittyTiger RAT
2014-02-15McAfeeMcAfee
Examining Your Very Own Sefnit Trojan
Mevade
2013-03-21McAfeeMcAfee
VSkimmer Botnet Targets Credit Card Payment Terminals
vSkimmer
2013-01-01McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
httpdropper
2012-09-18PastebinQassamCyberFighters
QassamCyberFighters's Pastebin
Cyber fighters of Izz Ad-Din Al Qassam
2012-09-07SymantecGavin O'Gorman, Geoff McDonald
The Elderwood Project
9002 RAT Beijing Group
2012-09-06SymantecGavin O'Gorman, Geoff McDonald
The Elderwood Project
Beijing Group
2012-04-05McAfeeMcAfee
Darkshell DDOS Botnet Evolves With Variants
DarkShell
2012-01-01CSIS Trend MicroFeike Hacquebord (Trend Micro), Peter Kruse (CSIS), Robert McArdle (Trend Micro)
W32.Tinba (Tinybanker) The Turkish Incident
Tinba
2011-08-27MicrosoftMatt McCormack
Morto.A
Morto
2011-06-29SymantecJohn McDonald
Inside a Back Door Attack
Ghost RAT Dust Storm
2011-06-29SymantecJohn McDonald
Inside a Back Door Attack
Dust Storm
2011-02-10McAfeeMcAfee Foundstone Professional Services, McAfee Labs
Global Energy Cyberattacks: “Night Dragon”
Night Dragon
2009-12-22SymantecJohn McDonald, Masaki Suenaga, Takayoshi Nakayama
Qakbot, Data Thief Unmasked: Part II
QakBot
2009-05-22Trend MicroAlice Decker, David Sancho, Loucif Kharouni, Max Goncharov, Robert McArdle
Pushdo / Cutwail Botnet
Pushdo