Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-01-13The Washington PostEllen Nakashima
Russian military was behind ‘NotPetya’ cyberattack in Ukraine, CIA concludes
EternalPetya
2018-01-12StormshieldRémi Jullian
Analyzing an Agent Tesla campaign: from a word document to the attacker credentials
Agent Tesla
2018-01-01Malwarebyteshasherezade
A coin miner with a “Heaven’s Gate”
Coinminer
2017-11-27BlacklakeBrian Krebs
WHO WAS THE NSA CONTRACTOR ARRESTED FOR LEAKING THE ‘SHADOW BROKERS’ HACKING TOOLS?
The Shadow Brokers
2017-11-08Palo Alto Networks Unit 42Robert Falcone
OilRig Deploys “ALMA Communicator” – DNS Tunneling Trojan
Alma Communicator
2017-11-01Virus BulletinPatrick Wardle
Offensive malware analysis: dissecting OSX/FruitFly.B via a custom C&C server
FruitFly
2017-10-30Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
Gaza Cybergang – updated activity in 2017:
Molerats
2017-10-05Virus BulletinCatalin Valeriu Lita, Doina Cosovan
Linking Xpaj and Nymaim
Nymaim
2017-10-05Trend MicroJaromír Hořejší
SYSCON Backdoor Uses FTP as a C&C Channel
Syscon
2017-09-26Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
Striking Oil: A Closer Look at Adversary Infrastructure
OilRig
2017-09-26Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
Striking Oil: A Closer Look at Adversary Infrastructure
RGDoor
2017-09-25Kaspersky LabsAlexey Shulmin, Dmitry Karasovsky, Vasily Berdnikov
A simple example of a complex cyberattack
Microcin Vicious Panda
2017-09-25Kaspersky LabsAlexey Shulmin, Dmitry Karasovsky, Vasily Berdnikov
A simple example of a complex cyberattack
Microcin
2017-09-01BitdefenderAlexandru Maximciuc, Cristina Vatamanu
EHDevel – The story of a continuously improving advanced threat creation toolkit
EHDevel
2017-08-25Bleeping ComputerLawrence Abrams
New Arena Crysis Ransomware Variant Released
Dharma
2017-08-14ProofpointKafeine
Threat actor goes on a Chrome extension hijacking spree
js.wd
2017-08-14Palo Alto Networks Unit 42Anthony Kasza
The Blockbuster Saga Continues
HOPLIGHT
2017-08-02Trend MicroMichael Villanueva
A Look at JS_POWMET, a Completely Fileless Malware
Powmet
2017-07-25ClearSkyClearSky Research Team
Operation Wilted Tulip – Exposing a Cyber Espionage Apparatus
Matryoshka RAT TDTESS CopyKittens
2017-06-16FireEyeFireEye
FIN10: Anatomy of a Cyber Extortion Operation
FIN10