Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-05-11Trend MicroGabrielle Joyce Mabutas, Kazuki Fujisawa
New MacOS Dacls RAT Backdoor Show Lazarus’ Multi-Platform Attack Capability
Dacls
2020-04-28Trend MicroMiguel Ang
Loki Info Stealer Propagates through LZH Files
Loki Password Stealer (PWS)
2020-04-27Trend MicroTrend Micro
Group Behind TrickBot Spreads Fileless BazarBackdoor
BazarBackdoor
2020-03-24Trend MicroEcular Xu, Elliot Cao, Joseph Chen, Lilang Wu, William Gamazo Sanchez
Technical Brief: Operation Poisoned News: Hong Kong Users Targeted with Mobile Malware via Local News Links
dmsSpy lightSpy
2020-03-24Trend MicroEcular Xu, Elliot Cao, Joseph Chen, Lilang Wu, William Gamazo Sanchez
Operation Poisoned News: Hong Kong Users Targeted With Mobile Malware via Local News Links
dmsSpy lightSpy
2020-03-23Trend MicroTrend Micro
Nefilim Ransomware Threatens to Expose Stolen Data
Nefilim
2020-03-11Trend MicroFeike Hacquebord
Pawn Storm in 2019: A Year of Scanning and Credential Phishing on High-Profile Targets
2020-03-11Trend MicroJaromír Hořejší, Joseph Chen
Operation Overtrap Targets Japanese Online Banking Users Via Bottle Exploit Kit and Brand-New Cinobi Banking Trojan
Cinobi
2020-03-11Trend MicroJaromír Hořejší, Joseph Chen
Operation Overtrap Targets Japanese Online Banking Users Via Bottle Exploit Kit and Brand-New Cinobi Banking Trojan: Technical Brief
Cinobi
2020-03-05Trend MicroVit Sembera
Geost: Anatomy of the Android Trojan Targeting Russia
Geost
2020-02-18Trend MicroCedric Pernet, Daniel Lunghi, Jamz Yaneza, Kenney Lu
Uncovering DRBControl
Clambling
2020-02-18Trend MicroCedric Pernet, Daniel Lunghi, Jamz Yaneza, Kenney Lu
Uncovering DRBControl: Inside the Cyberespionage Campaign Targeting Gambling Operations
Cobalt Strike HyperBro PlugX Trochilus RAT Operation DRBControl
2020-01-06Trend MicroEcular Xu, Joseph C Chen
First Active Attack Exploiting CVE-2019-2215 Found on Google Play, Linked to SideWinder APT Group
RAZOR TIGER
2020-01-01Trend MicroFyodor Yarochkin, Robert McArdle, Vladimir Kropotov
The Hacker Infrastructureand Underground Hosting:Services Used by Criminals
2019-12-16Trend MicroAliakbar Zahravi
Momentum Botnet's Newest DDoS Attacks and IoT Exploits
Momentum
2019-12-12Trend MicroCedric Pernet, Feike Hacquebord, Kenney Lu
More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting
APT33
2019-12-11Trend MicroAnita Hsieh, Dove Chiu, Vickie Su
Waterbear Returns, Uses API Hooking to Evade Security
Waterbear
2019-11-29Trend MicroHiroyuki Kakara, Joey Chen, Masaoki Shoji
Operation ENDTRADE:TICK: 2019s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data
BROLER
2019-11-29Trend MicroHiroyuki Kakara, Joey Chen, Masaoki Shoji
Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK
Datper Lilith
2019-10-09Trend MicroJoseph C. Chen
FIN6 Compromised E-commerce Platform via Magecart to Inject Credit Card Skimmers Into Thousands of Online Shops
magecart