Click here to download all references as Bib-File.•
2018-03-30
⋅
Trend Micro
⋅
Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types Project Alice ATMitch Ploutus ATM Ripper ATM Skimer SUCEFUL Tyupkin |
2018-02-01
⋅
Bitdefender
⋅
Operation PZChao: a possible return of the Iron Tiger APT APT27 |
2018-01-24
⋅
Objective-See
⋅
Analyzing CrossRAT: A cross-platform implant, utilized in a global cyber-espionage campaign CrossRAT |
2018-01-17
⋅
Malwarebytes
⋅
A coin miner with a “Heaven’s Gate” Coinminer |
2018-01-13
⋅
The Washington Post
⋅
Russian military was behind ‘NotPetya’ cyberattack in Ukraine, CIA concludes EternalPetya |
2018-01-12
⋅
Stormshield
⋅
Analyzing an Agent Tesla campaign: from a word document to the attacker credentials Agent Tesla |
2018-01-01
⋅
Malwarebytes
⋅
A coin miner with a “Heaven’s Gate” Coinminer |
2017-11-27
⋅
Blacklake
⋅
WHO WAS THE NSA CONTRACTOR ARRESTED FOR LEAKING THE ‘SHADOW BROKERS’ HACKING TOOLS? The Shadow Brokers |
2017-11-08
⋅
Palo Alto Networks Unit 42
⋅
OilRig Deploys “ALMA Communicator” – DNS Tunneling Trojan Alma Communicator |
2017-11-01
⋅
Virus Bulletin
⋅
Offensive malware analysis: dissecting OSX/FruitFly.B via a custom C&C server FruitFly |
2017-10-30
⋅
Kaspersky Labs
⋅
Gaza Cybergang – updated activity in 2017: Molerats |
2017-10-05
⋅
Virus Bulletin
⋅
Linking Xpaj and Nymaim Nymaim |
2017-10-05
⋅
Trend Micro
⋅
SYSCON Backdoor Uses FTP as a C&C Channel Syscon |
2017-09-26
⋅
Palo Alto Networks Unit 42
⋅
Striking Oil: A Closer Look at Adversary Infrastructure OilRig |
2017-09-26
⋅
Palo Alto Networks Unit 42
⋅
Striking Oil: A Closer Look at Adversary Infrastructure RGDoor |
2017-09-25
⋅
Kaspersky Labs
⋅
A simple example of a complex cyberattack Microcin Vicious Panda |
2017-09-25
⋅
Kaspersky Labs
⋅
A simple example of a complex cyberattack Microcin |
2017-09-01
⋅
Bitdefender
⋅
EHDevel – The story of a continuously improving advanced threat creation toolkit EHDevel |
2017-08-25
⋅
Bleeping Computer
⋅
New Arena Crysis Ransomware Variant Released Dharma |
2017-08-14
⋅
Proofpoint
⋅
Threat actor goes on a Chrome extension hijacking spree js.wd |