Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-03-30Trend MicroDavid Sancho, Massimiliano Michenz, Numaan Huq
Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types
Project Alice ATMitch Ploutus ATM Ripper ATM Skimer SUCEFUL Tyupkin
2018-02-01BitdefenderBogdan Botezatu, Ivona Alexandra Chili
Operation PZChao: a possible return of the Iron Tiger APT
APT27
2018-01-24Objective-SeePatrick Wardle
Analyzing CrossRAT: A cross-platform implant, utilized in a global cyber-espionage campaign
CrossRAT
2018-01-17Malwarebyteshasherezade
A coin miner with a “Heaven’s Gate”
Coinminer
2018-01-13The Washington PostEllen Nakashima
Russian military was behind ‘NotPetya’ cyberattack in Ukraine, CIA concludes
EternalPetya
2018-01-12StormshieldRémi Jullian
Analyzing an Agent Tesla campaign: from a word document to the attacker credentials
Agent Tesla
2018-01-01Malwarebyteshasherezade
A coin miner with a “Heaven’s Gate”
Coinminer
2017-11-27BlacklakeBrian Krebs
WHO WAS THE NSA CONTRACTOR ARRESTED FOR LEAKING THE ‘SHADOW BROKERS’ HACKING TOOLS?
The Shadow Brokers
2017-11-08Palo Alto Networks Unit 42Robert Falcone
OilRig Deploys “ALMA Communicator” – DNS Tunneling Trojan
Alma Communicator
2017-11-01Virus BulletinPatrick Wardle
Offensive malware analysis: dissecting OSX/FruitFly.B via a custom C&C server
FruitFly
2017-10-30Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
Gaza Cybergang – updated activity in 2017:
Molerats
2017-10-05Virus BulletinCatalin Valeriu Lita, Doina Cosovan
Linking Xpaj and Nymaim
Nymaim
2017-10-05Trend MicroJaromír Hořejší
SYSCON Backdoor Uses FTP as a C&C Channel
Syscon
2017-09-26Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
Striking Oil: A Closer Look at Adversary Infrastructure
OilRig
2017-09-26Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
Striking Oil: A Closer Look at Adversary Infrastructure
RGDoor
2017-09-25Kaspersky LabsAlexey Shulmin, Dmitry Karasovsky, Vasily Berdnikov
A simple example of a complex cyberattack
Microcin Vicious Panda
2017-09-25Kaspersky LabsAlexey Shulmin, Dmitry Karasovsky, Vasily Berdnikov
A simple example of a complex cyberattack
Microcin
2017-09-01BitdefenderAlexandru Maximciuc, Cristina Vatamanu
EHDevel – The story of a continuously improving advanced threat creation toolkit
EHDevel
2017-08-25Bleeping ComputerLawrence Abrams
New Arena Crysis Ransomware Variant Released
Dharma
2017-08-14ProofpointKafeine
Threat actor goes on a Chrome extension hijacking spree
js.wd