Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-08-06CrowdStrikeAdam Kozy, Johannes Gilger
Bringing A Cannon To A Knife Fight
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC
2015-04-15ByteAtlas
Knowledge Fragment: Bruteforcing Andromeda Configuration Buffers
Andromeda
2015-04-13CrowdStrikeDmitri Alperovitch
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2015-04-13CrowdStrikeDmitri Alperovitch
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2014-09-21garage4hackersgarage4hackers
Reversing Tinba: World's smallest trojan-banker DGA Code
2014-03-12FireEyeMike Oppenheim, Ned Moran
A Detailed Examination of the Siesta Campaign
APT1 Siesta
2014-03-06Trend MicroMaharlito Aquino
The Siesta Campaign: A New Targeted Attack Awakens
APT1
2014-02-24RSA ConferenceDmitri Alperovitch
The Art of Attribution Identifying and Pursuing your Cyber Adversaries
ANDROMEDA SPIDER APT19 DEXTOROUS SPIDER Ghost Jackal Silent Chollima SINGING SPIDER Tonto Team TOXIC PANDA UNION SPIDER
2013-10-29RSA ConferenceJaromír Hořejší, Peter Kálnai
Dissecting Banking Trojan Carberp
Carberp
2013-09-26MalwarebytesJoshua Cannell
New Solarbot Malware Debuts, Creator Publicly Advertising
Solarbot
2013-08-07FireEyeDennis Hanzlik, Ian Ahl, Tony Lee
Breaking Down the China Chopper Web Shell - Part I
CHINACHOPPER
2013-08-01MalwarebytesJoshua Cannell
Sophos Discovers ZeroAccess Using RLO
ZeroAccess
2013-07-30ESET Researchwelivesecurity
Versatile and infectious: Win64/Expiro is a cross‑platform file infector
Expiro
2013-07-25MalwarebytesJoshua Cannell
ZeroAccess uses Self-Debugging
ZeroAccess
2013-06-26SymantecSymantec Security Response
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War
Lazarus Group
2013-06-26SymantecSecurity Response
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War
Lazarus Group
2013-06-18FireEyeRong Hwa Chong
Trojan.APT.Seinup Hitting ASEAN
seinup
2013-05-02ESET ResearchStephen Cobb
The stealthiness of Linux/Cdorked: a clarification
CDorked
2013-04-01FireEyeRong Hwa Chong
Trojan.APT.BaneChant: In-Memory Trojan That Observes for Multiple Mouse Clicks
2013-03-13ESET ResearchAleksandr Matrosov
How Theola malware uses a Chrome plugin for banking fraud
Sinowal
2012-12-19ESET ResearchAleksandr Matrosov
Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems
Ranbyus
2012-11-16Information on Security BlogKeith Tyler
China Chopper Webshell - the 4KB that Owns your Web Server
2012-11-05MalwarebytesJérôme Segura
Citadel: a cyber-criminal’s ultimate weapon?
Citadel
2012-05-31CrySyS LabCrySyS Lab
sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks
Flame
2012-04-16SANSRong Hwa Chong
Detailed Analysis Of Sykipot (Smartcard Proxy Variant)
APT4
2009-03-28Infinitum LabsInformation Warfare Monitor
Tracking GhostNet: Investigating a Cyber Espionage Network
Ghost RAT GhostNet
2007-04-03USENIXKen Chiang, Levi Lloyd
A Case Study of the Rustock Rootkit and Spam Bot
Rustock