Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2013-07-25MalwarebytesJoshua Cannell
ZeroAccess uses Self-Debugging
ZeroAccess
2013-06-26SymantecSymantec Security Response
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War
Lazarus Group
2013-06-26SymantecSecurity Response
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War
Lazarus Group
2013-06-18FireEyeRong Hwa Chong
Trojan.APT.Seinup Hitting ASEAN
seinup
2013-05-02ESET ResearchStephen Cobb
The stealthiness of Linux/Cdorked: a clarification
CDorked
2013-04-01FireEyeRong Hwa Chong
Trojan.APT.BaneChant: In-Memory Trojan That Observes for Multiple Mouse Clicks
2013-03-13ESET ResearchAleksandr Matrosov
How Theola malware uses a Chrome plugin for banking fraud
Sinowal
2012-12-19ESET ResearchAleksandr Matrosov
Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems
Ranbyus
2012-11-16Information on Security BlogKeith Tyler
China Chopper Webshell - the 4KB that Owns your Web Server
2012-11-05MalwarebytesJérôme Segura
Citadel: a cyber-criminal’s ultimate weapon?
Citadel
2012-05-31CrySyS LabCrySyS Lab
sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks
Flame
2012-04-16SANSRong Hwa Chong
Detailed Analysis Of Sykipot (Smartcard Proxy Variant)
APT4
2009-03-28Infinitum LabsInformation Warfare Monitor
Tracking GhostNet: Investigating a Cyber Espionage Network
Ghost RAT GhostNet
2007-04-03USENIXKen Chiang, Levi Lloyd
A Case Study of the Rustock Rootkit and Spam Bot
Rustock