Click here to download all references as Bib-File.•
2015-08-06
⋅
CrowdStrike
⋅
Bringing A Cannon To A Knife Fight |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-04-15
⋅
Knowledge Fragment: Bruteforcing Andromeda Configuration Buffers Andromeda |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2014-09-21
⋅
garage4hackers
⋅
Reversing Tinba: World's smallest trojan-banker DGA Code |
2014-03-12
⋅
FireEye
⋅
A Detailed Examination of the Siesta Campaign APT1 Siesta |
2014-03-06
⋅
Trend Micro
⋅
The Siesta Campaign: A New Targeted Attack Awakens APT1 |
2014-02-24
⋅
RSA Conference
⋅
The Art of Attribution Identifying and Pursuing your Cyber Adversaries ANDROMEDA SPIDER APT19 DEXTOROUS SPIDER Ghost Jackal Silent Chollima SINGING SPIDER Tonto Team TOXIC PANDA UNION SPIDER |
2013-10-29
⋅
RSA Conference
⋅
Dissecting Banking Trojan Carberp Carberp |
2013-09-26
⋅
Malwarebytes
⋅
New Solarbot Malware Debuts, Creator Publicly Advertising Solarbot |
2013-08-07
⋅
FireEye
⋅
Breaking Down the China Chopper Web Shell - Part I CHINACHOPPER |
2013-08-01
⋅
Malwarebytes
⋅
Sophos Discovers ZeroAccess Using RLO ZeroAccess |
2013-07-30
⋅
ESET Research
⋅
Versatile and infectious: Win64/Expiro is a cross‑platform file infector Expiro |
2013-07-25
⋅
Malwarebytes
⋅
ZeroAccess uses Self-Debugging ZeroAccess |
2013-06-26
⋅
Symantec
⋅
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War Lazarus Group |
2013-06-26
⋅
Symantec
⋅
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War Lazarus Group |
2013-06-18
⋅
FireEye
⋅
Trojan.APT.Seinup Hitting ASEAN seinup |
2013-05-02
⋅
ESET Research
⋅
The stealthiness of Linux/Cdorked: a clarification CDorked |
2013-04-01
⋅
FireEye
⋅
Trojan.APT.BaneChant: In-Memory Trojan That Observes for Multiple Mouse Clicks |
2013-03-13
⋅
ESET Research
⋅
How Theola malware uses a Chrome plugin for banking fraud Sinowal |
2012-12-19
⋅
ESET Research
⋅
Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems Ranbyus |
2012-11-16
⋅
Information on Security Blog
⋅
China Chopper Webshell - the 4KB that Owns your Web Server |
2012-11-05
⋅
Malwarebytes
⋅
Citadel: a cyber-criminal’s ultimate weapon? Citadel |
2012-05-31
⋅
CrySyS Lab
⋅
sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks Flame |
2012-04-16
⋅
SANS
⋅
Detailed Analysis Of Sykipot (Smartcard Proxy Variant) APT4 |
2009-03-28
⋅
Infinitum Labs
⋅
Tracking GhostNet: Investigating a Cyber Espionage Network Ghost RAT GhostNet |
2007-04-03
⋅
USENIX
⋅
A Case Study of the Rustock Rootkit and Spam Bot Rustock |