Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-09-09InfoArmorAndrew Komarov
GOVRAT V2.0 - Attacking US military and government
GovRAT
2016-08-16SecurityIntelligenceDenis Laskov, Limor Kessem, Ziv Eli
Brazil Can’t Catch a Break: After Panda Comes the Sphinx
Zeus OpenSSL
2016-08-13CrowdStrikeChris Scott, Wendi Whitmore
Detecting and Responding: Pandas and Bears
FOXY PANDA POISONUS PANDA
2016-08-01Electronic Frontier FoundationClaudio Guarnieri, Cooper Quintin, Eva Galperin, Morgan Marquis-Boire
Operation Manul
jRAT Bandook
2016-07-08SecurityIntelligenceLimor Kessem
GootKit: Bobbing and Weaving to Avoid Prying Eyes
GootKit
2016-05-26SymantecSecurity Response
SWIFT attackers’ malware linked to more financial attacks
Contopee DYEPACK Sierra(Alfa,Bravo, ...) Lazarus Group
2016-05-26SymantecSymantec Security Response
SWIFT attackers’ malware linked to more financial attacks
Contopee Lazarus Group
2016-04-27Kaspersky LabsGReAT
Freezer Paper around Free Meat (Repackaging Open Source BeEF for Tracking and More)
Charming Kitten
2016-04-14SecurityIntelligenceLimor Kessem, Lior Keshet
Meet GozNym: The Banking Malware Offspring of Gozi ISFB and Nymaim
ISFB Nymaim GozNym
2016-04-06ProofpointChris Wakelin
Locky Ransomware Is Becoming More Sophisticated - Cybercriminals Continue Email Campaign Innovation
Rockloader
2016-01-01CrowdStrikeChristopher Scott, Wendi Whitmore
Detecting and Responding: Pandas and Bears
ELOQUENT PANDA UNION PANDA
2015-12-08The CitizenlabClaudio Guarnieri, John Scott-Railton, Marion Marschalek, Morgan Marquis-Boire
Packrat: Seven Years of a South American Threat Actor
AdWind Adzok CyberGate Xtreme RAT Packrat
2015-11-17SpiderLabs BlogEric Merritt
New Memory Scraping Technique in Cherry Picker PoS Malware
CherryPicker POS
2015-11-05Kudelski Securitykscert
Sphinx Moth: Expanding our knowledge of the “Wild Neutron” / “Morpho” APT
WildNeutron
2015-08-31SecurityIntelligenceDenis Laskov, Ilya Kolmanovich, Limor Kessem
Shifu: ‘Masterful’ New Banking Trojan Is Attacking 14 Japanese Banks
Shifu
2015-08-12SecurityIntelligenceLimor Kessem
Tinba Trojan Sets Its Sights on Romania
Tinba
2015-08-10shadowserverBen Koehl, Ned Moran
The Italian Connection: An analysis of exploit supply chains and digital quartermasters
smac APT20
2015-07-13SymantecA L Johnson
“Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory
SEADADDY
2015-03-04BriMor LabsBriMor Labs
And you get a POS malware name...and you get a POS malware name....and you get a POS malware name....
pwnpos
2014-11-21FireEyeJoshua Homan, Mike Oppenheim, Mike Scott, Ned Moran
Operation Double Tap
pirpi