Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-12-16ESET ResearchJosep Albors
Nemucod malware spreads ransomware Teslacrypt around the world
TeslaCrypt
2015-11-11ESET ResearchJean-Ian Boutin
Operation Buhtrap malware distributed via ammyy.com
BuhTrap
2015-09-08ESET ResearchAnton Cherepanov
Carbanak gang is back and packing new guns
DRIFTPIN
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC
2015-07-10ESET ResearchESET Research
Sednit APT Group Meets Hacking Team
2015-05-26ESET ResearchGraham Cluley
Moose – the router worm with an appetite for social networks
Moose
2015-05-01ESET ResearchMatías Porolli, Pablo Ramos
CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails
Banload
2015-05-01ESET ResearchMatías Porolli, Pablo Ramos
CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails
Banload
2015-04-29ESET ResearchESET Research
Unboxing Linux/Mumblehard: Muttering spam from your servers
2015-04-28ESET ResearchMarc-Etienne M.Léveillé
Unboxing Linux/Mumblehard: Muttering spam from your servers
Mumblehard
2015-04-09ESET ResearchJean-Ian Boutin
Operation Buhtrap, the trap for Russian accountants
Buhtrap BuhTrap
2015-03-09ESET ResearchMarc-Etienne M.Léveillé
CryptoFortress mimics TorrentLocker but is a different ransomware
CryptoFortress
2015-03-05ESET ResearchJoan Calvet
Casper Malware: After Babar and Bunny, Another Espionage Cartoon
Casper
2014-12-22ESET ResearchESET Research
Virlock: First Self‑Reproducing Ransomware is also a Shape Shifter
VirLock
2014-11-12ESET ResearchRobert Lipovsky
Korplug military targeted attacks: Afghanistan & Tajikistan
DarkStRat
2014-10-15ESET ResearchOlivier Bilodeau
Operation Windigo: “Good job, ESET!” says malware author
Ebury
2014-10-14ESET ResearchRobert Lipovsky
CVE‑2014‑4114: Details on August BlackEnergy PowerPoint Campaigns
BlackEnergy