Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-04-13FireEyeDaniel Regalado, Erye Hernandez, Taha Karim, Varun Jian
Ghosts in the Endpoint
PLEAD
2016-03-25Palo Alto Networks Unit 42Robert Falcone, Simon Conant
ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe
Bozok Operation C-Major
2016-03-01Group-IBGroup-IB
BUHTRAP: The Evolution of Targetted Attacks Against Financial Instituitions
BuhTrap
2016-02-16SymantecDick O'Brien
Dridex: Tidal waves of spam pushing dangerous financial Trojan
Dridex
2016-01-01Palo Alto Networks Unit 42Peter Renals, Simon Conant
SILVERTERRIER
SilverTerrier
2015-12-07FireEyeDimiter Andonov, Jay Taylor, Nalani Fraser, Will Matson, William Ballenthin
Thriving Beyond The Operating System: Financial Threat Group Targets Volume Boot Record
FIN1
2015-12-07FireEyeDimiter Andonov, Jay Taylor, Nalani Fraser, Will Matson, William Ballenthin
Thriving Beyond The Operating System: Financial Threat Group Targets Volume Boot Record
FIN1
2015-12-07FireEyeDimiter Andonov, Jay Taylor, Nalani Fraser, Will Matson, William Ballenthin
Thriving Beyond The Operating System: Financial Threat Group Targets Volume Boot Record
FIN1
2015-12-07FireEyeDimiter Andonov, Jay Taylor, Nalani Fraser, Will Matson, William Ballenthin
Thriving Beyond The Operating System: Financial Threat Group Targets Volume Boot Record
FIN1
2015-12-07FireEyeDimiter Andonov, Jay Taylor, Nalani Fraser, Will Matson, William Ballenthin
Thriving Beyond The Operating System: Financial Threat Group Targets Volume Boot Record
FIN1
2015-06-26Hanan Natan
Rovnix Payload Analysis
ReactorBot
2015-05-15Malware DiggerHanan Natan
Rovnix Dropper Analysis (TrojanDropper:Win32/Rovnix.P)
ReactorBot Rovnix
2015-05-10root9broot9b
APT28 Targets Financial Markets
2014-10-27Trend MicroAlfred Remorin, Douglas Otis, Feike Hacquebord, Fernando Mercês, Jim Gogolinski, Loucif Kharouni, Numaan Huq
Operation Pawn Storm: Using Decoys to Evade Detection
Sedreco Seduploader APT28
2014-10-01Trend MicroAlfred Remorin, Douglas Otis, Feike Hacquebord, Fernando Mercês, Jim Gogolinski, Loucif Kharouni, Numaan Huq
Operation Pawn Storm: Using Decoys to Evade Detection
2014-07-11Airbus Defence & SpaceCedric Pernet, David Bizeul, Fabien Perigaud, Ivan Fontarensky, Ronan Mouchoux
The Eye of the Tiger
APT24
2014-07-11AirbusCedric Pernet, David Bizeul, Fabien Perigaud, Ivan Fontarensky, Ronan Mouchoux
The Eye of the Tiger
APT24
2014-07-11AirbusCedric Pernet, David Bizeul, Fabien Perigaud, Ivan Fontarensky, Ronan Mouchoux
The Eye of the Tiger
APT24
2014-05-05Kevin Breen
VT Comments Page on Blue Banana Sample
Blue Banana RAT
2014-01-27Trend MicroFernando Mercês
CPL Malware: Malicious Control Panel Items
Banload Mevade
2014-01-01Airbus Defence & SpaceCedric Pernet, David Bizeul, Fabien Perigaud, Ivan Fontarensky, Ronan Mouchoux
The Eye of the Tiger
paladin PittyTiger RAT
2013-09-24Hanan Natan
How to extract BetaBot config info
BetaBot
2013-05-29SymantecLionel Payet
South Korean Financial Companies Targeted by Castov
Lazarus Group
2013-05-28SymantecLionel Payet
South Korean Financial Companies Targeted by Castov
Lazarus Group
2013-03-05Sophos Naked SecurityAnand Ajjan
Russian ransomware takes advantage of Windows PowerShell
FTCODE
2012-12-24Contagiodump BlogMila Parkour
Dec. 2012 Trojan.Stabuniq samples - financial infostealer trojan
Stabuniq
2012-12-20SymantecFred Gutierrez
Trojan.Stabuniq Found on Financial Institution Servers
Stabuniq
2012-08-30SophosSophos
Troj/Binanen-B
Binanen
2012-02-15Security IntelligenceAmit Klein
Merchant of Fraud Returns: Shylock Polymorphic Financial Malware Infections on the Rise
Shylock
2011-09-21Contagiodump BlogMila Parkour
Sept 21 Greedy Shylock - financial malware
Shylock