Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-04-13Palo Alto Networks Unit 42Mike Harbison, Simon Conant
Say “Cheese”: WebMonitor RAT Comes with C2-as-a-Service (C2aaS)
WebMonitor RAT
2018-03-09Adam Senft, Bill Marczak, Jakub Dalek, John Scott-Railton, Ron Deibert, Sarah McKune
Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?
StrongPity
2018-02-08Trend MicroTrend Micro
ShurL0ckr Ransomware as a Service Peddled on Dark Web, can Reportedly Bypass Cloud Applications
Shurl0ckr
2018-01-26Palo Alto Networks Unit 42Josh Grunzweig
The TopHat Campaign: Attacks Within The Middle East Region Using Popular Third-Party Services
Scote
2018-01-01FireEyeFireEye
The Forrester New Wave™: External Threat Intelligence Services, Q3 2018.
APT1
2017-12-11Bleeping ComputerCatalin Cimpanu
BrickerBot Author Retires Claiming to Have Bricked over 10 Million IoT Devices
BrickerBot
2017-09-21ViceLorenzo Franceschi-Bicchierai
This Ransomware Demands Nudes Instead of Bitcoin
nRansom
2017-06-09FortinetRommel Joven, Wayne Chin Yick Low
MacRansom: Offered as Ransomware as a Service
MacRansom
2017-06-09AT&TPeter Ewane
MacSpy: OS X Mac RAT as a Service
MacSpy
2017-04-21Bleeping ComputerCatalin Cimpanu
BrickerBot Author Claims He Bricked Two Million Devices
BrickerBot
2017-01-19Bleeping ComputerLawrence Abrams
New Satan Ransomware available through a Ransomware as a Service.
Satan
2016-12-20ESET ResearchMichal Malík, Peter Kálnai
New Linux/Rakos threat: devices and servers under SSH scan (again)
Rakos
2016-12-20ESET ResearchMichal Malík, Peter Kálnai
New Linux/Rakos threat: devices and servers under SSH scan (again)
2016-12-01US-CERTUS-CERT
Alert (TA16-336A): Avalanche (crimeware-as-a-service infrastructure)
GootKit
2016-11-30FortinetLilia Elena Gonzalez Medina
Bladabindi Remains A Constant Threat By Using Dynamic DNS Services
NjRAT
2016-10-16RapidityNetworksIoannis Profetis, Sam Edwards
Hajime: Analysis of a decentralizedinternet worm for IoT devices
Hajime
2016-10-01Vice MotherboardJanus Rose
‘Shadow Brokers’ Whine That Nobody Is Buying Their Hacked NSA Files
The Shadow Brokers
2016-09-13Palo Alto Networks Unit 42Claud Xiao
DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices
DualToy
2016-09-13Palo Alto Networks Unit 42Claud Xiao
DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices
DualToy DualToy
2016-02-18Palo Alto Networks Unit 42Claud Xiao, Cong Zheng, Zhi Xu
New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom
Xbot