Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-10-16RapidityNetworksSam Edwards, Ioannis Profetis
@techreport{edwards:20161016:hajime:e095dad, author = {Sam Edwards and Ioannis Profetis}, title = {{Hajime: Analysis of a decentralizedinternet worm for IoT devices}}, date = {2016-10-16}, institution = {RapidityNetworks}, url = {https://security.rapiditynetworks.com/publications/2016-10-16/hajime.pdf}, language = {English}, urldate = {2020-01-09} } Hajime: Analysis of a decentralizedinternet worm for IoT devices
Hajime
2016-10-01Vice MotherboardJanus Rose
@online{rose:20161001:shadow:49e8aeb, author = {Janus Rose}, title = {{‘Shadow Brokers’ Whine That Nobody Is Buying Their Hacked NSA Files}}, date = {2016-10-01}, organization = {Vice Motherboard}, url = {https://www.vice.com/en_us/article/53djj3/shadow-brokers-whine-that-nobody-is-buying-their-hacked-nsa-files}, language = {English}, urldate = {2020-01-13} } ‘Shadow Brokers’ Whine That Nobody Is Buying Their Hacked NSA Files
The Shadow Brokers
2016-09-13Palo Alto Networks Unit 42Claud Xiao
@online{xiao:20160913:dualtoy:d6598c8, author = {Claud Xiao}, title = {{DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices}}, date = {2016-09-13}, organization = {Palo Alto Networks Unit 42}, url = {http://researchcenter.paloaltonetworks.com/2016/09/dualtoy-new-windows-trojan-sideloads-risky-apps-to-android-and-ios-devices/}, language = {English}, urldate = {2019-12-20} } DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices
DualToy DualToy
2016-09-13Palo Alto Networks Unit 42Claud Xiao
@online{xiao:20160913:dualtoy:9220ab5, author = {Claud Xiao}, title = {{DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices}}, date = {2016-09-13}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2016/09/dualtoy-new-windows-trojan-sideloads-risky-apps-to-android-and-ios-devices/}, language = {English}, urldate = {2019-12-20} } DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices
DualToy
2016-02-18Palo Alto Networks Unit 42Cong Zheng, Claud Xiao, Zhi Xu
@online{zheng:20160218:new:c8ee05b, author = {Cong Zheng and Claud Xiao and Zhi Xu}, title = {{New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom}}, date = {2016-02-18}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2016/02/new-android-trojan-xbot-phishes-credit-cards-and-bank-accounts-encrypts-devices-for-ransom/}, language = {English}, urldate = {2019-12-20} } New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom
Xbot
2015-11-06SecurityIntelligenceShane Schick
@online{schick:20151106:omnirat:9ac8a54, author = {Shane Schick}, title = {{OmniRAT Takes Over Android Devices Through Social Engineering Tricks}}, date = {2015-11-06}, organization = {SecurityIntelligence}, url = {https://securityintelligence.com/news/omnirat-takes-over-android-devices-through-social-engineering-tricks/}, language = {English}, urldate = {2020-01-06} } OmniRAT Takes Over Android Devices Through Social Engineering Tricks
OmniRAT
2015-09-23SpiderLabs BlogRodel Mendrez
@online{mendrez:20150923:quaverse:9d9d163, author = {Rodel Mendrez}, title = {{Quaverse RAT: Remote-Access-as-a-Service}}, date = {2015-09-23}, organization = {SpiderLabs Blog}, url = {https://www.trustwave.com/Resources/SpiderLabs-Blog/Quaverse-RAT--Remote-Access-as-a-Service/}, language = {English}, urldate = {2020-01-06} } Quaverse RAT: Remote-Access-as-a-Service
QRat
2015-07-22F-SecureArtturi Lehtiö
@online{lehti:20150722:duke:8f54e8b, author = {Artturi Lehtiö}, title = {{Duke APT group's latest tools: cloud services and Linux support}}, date = {2015-07-22}, organization = {F-Secure}, url = {https://www.f-secure.com/weblog/archives/00002822.html}, language = {English}, urldate = {2019-10-15} } Duke APT group's latest tools: cloud services and Linux support
CloudDuke
2015-07-05ViceLorenzo Franceschi-Bicchierai
@online{franceschibicchierai:20150705:spy:30cea5b, author = {Lorenzo Franceschi-Bicchierai}, title = {{Spy Tech Company 'Hacking Team' Gets Hacked}}, date = {2015-07-05}, organization = {Vice}, url = {https://www.vice.com/en_us/article/gvye3m/spy-tech-company-hacking-team-gets-hacked}, language = {English}, urldate = {2019-10-14} } Spy Tech Company 'Hacking Team' Gets Hacked
Hacking Team
2015-02-18Vice MotherboardLorenzo Franceschi-Bicchierai
@online{franceschibicchierai:20150218:meet:2f64fcb, author = {Lorenzo Franceschi-Bicchierai}, title = {{Meet Babar, a New Malware Almost Certainly Created by France}}, date = {2015-02-18}, organization = {Vice Motherboard}, url = {https://motherboard.vice.com/read/meet-babar-a-new-malware-almost-certainly-created-by-france}, language = {English}, urldate = {2020-01-10} } Meet Babar, a New Malware Almost Certainly Created by France
SNOWGLOBE
2014-11-13Trend MicroRhena Inocencio
@online{inocencio:20141113:bashlite:647137b, author = {Rhena Inocencio}, title = {{BASHLITE Affects Devices Running on BusyBox}}, date = {2014-11-13}, organization = {Trend Micro}, url = {http://blog.trendmicro.com/trendlabs-security-intelligence/bashlite-affects-devices-running-on-busybox/}, language = {English}, urldate = {2019-07-10} } BASHLITE Affects Devices Running on BusyBox
Bashlite
2013-11-06CrowdStrikeAdam Meyers
@online{meyers:20131106:viceroy:9e41682, author = {Adam Meyers}, title = {{VICEROY TIGER Delivers New Zero-Day Exploit}}, date = {2013-11-06}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/viceroy-tiger-delivers-new-zero-day-exploit/index.html}, language = {English}, urldate = {2022-03-16} } VICEROY TIGER Delivers New Zero-Day Exploit
VICEROY TIGER
2013-08-25AusCERTParth Shukla
@online{shukla:20130825:compromised:2881854, author = {Parth Shukla}, title = {{The Compromised Devices of the Carna Botnet}}, date = {2013-08-25}, organization = {AusCERT}, url = {https://docs.google.com/file/d/0BxMgdZPXsSLBN1ZuTUVDM1ZZV0k/edit}, language = {English}, urldate = {2020-08-18} } The Compromised Devices of the Carna Botnet
2012-11-16Github (DesignativeDave)DesignativeDave
@online{designativedave:20121116:remote:d5d4856, author = {DesignativeDave}, title = {{Remote Administration Tool for Android devices}}, date = {2012-11-16}, organization = {Github (DesignativeDave)}, url = {https://github.com/DesignativeDave/androrat}, language = {English}, urldate = {2019-11-26} } Remote Administration Tool for Android devices
AndroRAT
2012-01-13Middle East OnlineMiddle East Online
@online{online:20120113:cyber:de2ee6e, author = {Middle East Online}, title = {{Cyber war: 'Gaza hackers' deface Israel fire service website}}, date = {2012-01-13}, organization = {Middle East Online}, url = {https://middle-east-online.com/en/cyber-war-gaza-hackers-deface-israel-fire-service-website}, language = {English}, urldate = {2019-10-12} } Cyber war: 'Gaza hackers' deface Israel fire service website
Molerats
2011-10-26IntegoPeter James
@online{james:20111026:tsunami:7815511, author = {Peter James}, title = {{Tsunami Backdoor Can Be Used for Denial of Service Attacks}}, date = {2011-10-26}, organization = {Intego}, url = {https://www.intego.com/mac-security-blog/tsunami-backdoor-can-be-used-for-denial-of-service-attacks}, language = {English}, urldate = {2019-10-25} } Tsunami Backdoor Can Be Used for Denial of Service Attacks
Tsunami
2011-02-10McAfeeMcAfee Foundstone Professional Services, McAfee Labs
@techreport{services:20110210:global:c04a33d, author = {McAfee Foundstone Professional Services and McAfee Labs}, title = {{Global Energy Cyberattacks: “Night Dragon”}}, date = {2011-02-10}, institution = {McAfee}, url = {https://securingtomorrow.mcafee.com/wp-content/uploads/2011/02/McAfee_NightDragon_wp_draft_to_customersv1-1.pdf}, language = {English}, urldate = {2019-12-19} } Global Energy Cyberattacks: “Night Dragon”
Night Dragon
2010-11-20InfoSec InstituteGiuseppe Bonfa
@online{bonfa:20101120:kernelmode:b6d039e, author = {Giuseppe Bonfa}, title = {{The Kernel-Mode Device Driver Stealth Rootkit}}, date = {2010-11-20}, organization = {InfoSec Institute}, url = {http://resources.infosecinstitute.com/zeroaccess-malware-part-2-the-kernel-mode-device-driver-stealth-rootkit/}, language = {English}, urldate = {2020-01-13} } The Kernel-Mode Device Driver Stealth Rootkit
ZeroAccess
2010-11-16Giuseppe Bonfa
@online{bonfa:20101116:zeroaccess:14293db, author = {Giuseppe Bonfa}, title = {{ZEROACCESS MALWARE - PART 3: The Device Driver Process Injection Rootkit}}, date = {2010-11-16}, url = {http://resources.infosecinstitute.com/zeroaccess-malware-part-3-the-device-driver-process-injection-rootkit/}, language = {English}, urldate = {2020-01-08} } ZEROACCESS MALWARE - PART 3: The Device Driver Process Injection Rootkit
ZeroAccess