Click here to download all references as Bib-File.•
2016-01-09
⋅
Industrial Control Systems
⋅
Confirmation of a Coordinated Attack on the Ukrainian Power Grid Sandworm |
2015-12-30
⋅
CrowdStrike
⋅
Bringing A Cannon To A Knife Fight |
2015-11-02
⋅
⋅
CyS Centrum
⋅
Modular trojan for hidden access to a computer LatentBot |
2015-11-01
⋅
Check Point
⋅
ROCKET KIT TEN: A CAMPAIGN WITH 9 LIVES FireMalv MPKBot Woolger Cleaver Rocket Kitten |
2015-09-28
⋅
Kaspersky Labs
⋅
Gaza cybergang, where’s your IR team? Molerats |
2015-08-06
⋅
CrowdStrike
⋅
Bringing A Cannon To A Knife Fight |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-04-15
⋅
Knowledge Fragment: Bruteforcing Andromeda Configuration Buffers Andromeda |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2014-09-21
⋅
garage4hackers
⋅
Reversing Tinba: World's smallest trojan-banker DGA Code |
2014-03-12
⋅
FireEye
⋅
A Detailed Examination of the Siesta Campaign APT1 Siesta |
2014-03-06
⋅
Trend Micro
⋅
The Siesta Campaign: A New Targeted Attack Awakens APT1 |
2014-02-24
⋅
RSA Conference
⋅
The Art of Attribution Identifying and Pursuing your Cyber Adversaries ANDROMEDA SPIDER APT19 DEXTOROUS SPIDER Ghost Jackal Silent Chollima SINGING SPIDER Tonto Team TOXIC PANDA UNION SPIDER |
2013-10-29
⋅
RSA Conference
⋅
Dissecting Banking Trojan Carberp Carberp |
2013-09-26
⋅
Malwarebytes
⋅
New Solarbot Malware Debuts, Creator Publicly Advertising Solarbot |
2013-08-07
⋅
FireEye
⋅
Breaking Down the China Chopper Web Shell - Part I CHINACHOPPER |
2013-08-01
⋅
Malwarebytes
⋅
Sophos Discovers ZeroAccess Using RLO ZeroAccess |
2013-07-30
⋅
ESET Research
⋅
Versatile and infectious: Win64/Expiro is a cross‑platform file infector Expiro |