Click here to download all references as Bib-File.•
2013-07-25
⋅
Malwarebytes
⋅
ZeroAccess uses Self-Debugging ZeroAccess |
2013-06-26
⋅
Symantec
⋅
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War Lazarus Group |
2013-06-26
⋅
Symantec
⋅
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War Lazarus Group |
2013-06-18
⋅
FireEye
⋅
Trojan.APT.Seinup Hitting ASEAN seinup |
2013-05-02
⋅
ESET Research
⋅
The stealthiness of Linux/Cdorked: a clarification CDorked |
2013-04-01
⋅
FireEye
⋅
Trojan.APT.BaneChant: In-Memory Trojan That Observes for Multiple Mouse Clicks |
2013-03-13
⋅
ESET Research
⋅
How Theola malware uses a Chrome plugin for banking fraud Sinowal |
2012-12-19
⋅
ESET Research
⋅
Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems Ranbyus |
2012-11-16
⋅
Information on Security Blog
⋅
China Chopper Webshell - the 4KB that Owns your Web Server |
2012-11-05
⋅
Malwarebytes
⋅
Citadel: a cyber-criminal’s ultimate weapon? Citadel |
2012-05-31
⋅
CrySyS Lab
⋅
sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks Flame |
2012-04-16
⋅
SANS
⋅
Detailed Analysis Of Sykipot (Smartcard Proxy Variant) APT4 |
2009-03-28
⋅
Infinitum Labs
⋅
Tracking GhostNet: Investigating a Cyber Espionage Network Ghost RAT GhostNet |
2007-04-03
⋅
USENIX
⋅
A Case Study of the Rustock Rootkit and Spam Bot Rustock |