Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-01-01RuxconMatt McCormack
WHY ATTACKER TOOLSETS DO WHAT THEY DO
Winnti
2014-07-15McAfeeMcAfee
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
APT24
2014-07-15McAfeeMcAfee
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
PittyTiger RAT
2014-02-15McAfeeMcAfee
Examining Your Very Own Sefnit Trojan
Mevade
2013-03-21McAfeeMcAfee
VSkimmer Botnet Targets Credit Card Payment Terminals
vSkimmer
2013-01-01McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
httpdropper
2012-09-18PastebinQassamCyberFighters
QassamCyberFighters's Pastebin
Cyber fighters of Izz Ad-Din Al Qassam
2012-09-07SymantecGavin O'Gorman, Geoff McDonald
The Elderwood Project
9002 RAT Beijing Group
2012-09-06SymantecGavin O'Gorman, Geoff McDonald
The Elderwood Project
Beijing Group
2012-04-05McAfeeMcAfee
Darkshell DDOS Botnet Evolves With Variants
DarkShell
2012-01-01CSIS Trend MicroFeike Hacquebord (Trend Micro), Peter Kruse (CSIS), Robert McArdle (Trend Micro)
W32.Tinba (Tinybanker) The Turkish Incident
Tinba
2011-08-27MicrosoftMatt McCormack
Morto.A
Morto
2011-06-29SymantecJohn McDonald
Inside a Back Door Attack
Ghost RAT Dust Storm
2011-06-29SymantecJohn McDonald
Inside a Back Door Attack
Dust Storm
2011-02-10McAfeeMcAfee Foundstone Professional Services, McAfee Labs
Global Energy Cyberattacks: “Night Dragon”
Night Dragon
2009-12-22SymantecJohn McDonald, Masaki Suenaga, Takayoshi Nakayama
Qakbot, Data Thief Unmasked: Part II
QakBot
2009-05-22Trend MicroAlice Decker, David Sancho, Loucif Kharouni, Max Goncharov, Robert McArdle
Pushdo / Cutwail Botnet
Pushdo