Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-08-12Kaspersky LabsBoris Larin
@online{larin:20200812:internet:91fcf4e, author = {Boris Larin}, title = {{Internet Explorer and Windows zero-day exploits used in Operation PowerFall}}, date = {2020-08-12}, organization = {Kaspersky Labs}, url = {https://securelist.com/ie-and-windows-zero-day-operation-powerfall/97976/}, language = {English}, urldate = {2020-08-12} } Internet Explorer and Windows zero-day exploits used in Operation PowerFall
2020-07-31Kaspersky LabsFedor Sinitsyn
@online{sinitsyn:20200731:wastedlocker:2eebe51, author = {Fedor Sinitsyn}, title = {{WastedLocker: technical analysis}}, date = {2020-07-31}, organization = {Kaspersky Labs}, url = {https://securelist.com/wastedlocker-technical-analysis/97944/}, language = {English}, urldate = {2020-08-05} } WastedLocker: technical analysis
WastedLocker
2020-07-29Kaspersky LabsGReAT
@online{great:20200729:trends:6810325, author = {GReAT}, title = {{APT trends report Q2 2020}}, date = {2020-07-29}, organization = {Kaspersky Labs}, url = {https://securelist.com/apt-trends-report-q2-2020/97937/}, language = {English}, urldate = {2020-07-30} } APT trends report Q2 2020
PhantomLance Dacls Penquin Turla elf.wellmess AppleJeus Dacls AcidBox Cobalt Strike Dacls EternalPetya Godlike12 Olympic Destroyer PlugX shadowhammer ShadowPad Sinowal VHD Ransomware Volgmer WellMess X-Agent XTunnel
2020-07-28Kaspersky LabsIvan Kwiatkowski, Pierre Delcher, Félix Aime
@online{kwiatkowski:20200728:lazarus:5b1523a, author = {Ivan Kwiatkowski and Pierre Delcher and Félix Aime}, title = {{Lazarus on the hunt for big game}}, date = {2020-07-28}, organization = {Kaspersky Labs}, url = {https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/}, language = {English}, urldate = {2020-07-30} } Lazarus on the hunt for big game
Dacls Dacls Dacls VHD Ransomware
2020-07-22Kaspersky LabsGReAT
@online{great:20200722:mata:591e184, author = {GReAT}, title = {{MATA: Multi-platform targeted malware framework}}, date = {2020-07-22}, organization = {Kaspersky Labs}, url = {https://securelist.com/mata-multi-platform-targeted-malware-framework/97746/}, language = {English}, urldate = {2020-07-23} } MATA: Multi-platform targeted malware framework
Dacls Dacls Dacls
2020-07-14Kaspersky LabsGReAT
@online{great:20200714:tetrade:c97f76a, author = {GReAT}, title = {{The Tetrade: Brazilian banking malware goes global}}, date = {2020-07-14}, organization = {Kaspersky Labs}, url = {https://securelist.com/the-tetrade-brazilian-banking-malware/97779/}, language = {English}, urldate = {2020-07-15} } The Tetrade: Brazilian banking malware goes global
Astaroth Grandoreiro Melcoz
2020-07-06Kaspersky LabsIgor Golovin, Anton Kivva
@online{golovin:20200706:pig:c3a73df, author = {Igor Golovin and Anton Kivva}, title = {{Pig in a poke: smartphone adware}}, date = {2020-07-06}, organization = {Kaspersky Labs}, url = {https://securelist.com/pig-in-a-poke-smartphone-adware/97607/}, language = {English}, urldate = {2020-07-08} } Pig in a poke: smartphone adware
2020-06-24Kaspersky LabsBoris Larin
@online{larin:20200624:magnitude:90a4a71, author = {Boris Larin}, title = {{Magnitude exploit kit - evolution}}, date = {2020-06-24}, organization = {Kaspersky Labs}, url = {https://securelist.com/magnitude-exploit-kit-evolution/97436/}, language = {English}, urldate = {2020-06-24} } Magnitude exploit kit - evolution
2020-06-23Kaspersky LabsAlexander Eremin
@online{eremin:20200623:oh:4e55504, author = {Alexander Eremin}, title = {{Oh, what a boot-iful mornin’ Rovnix bootkit back in business}}, date = {2020-06-23}, organization = {Kaspersky Labs}, url = {https://securelist.com/oh-what-a-boot-iful-mornin/97365}, language = {English}, urldate = {2020-06-23} } Oh, what a boot-iful mornin’ Rovnix bootkit back in business
Rovnix
2020-06-22Kaspersky LabsVictoria Vlasova
@online{vlasova:20200622:web:4a9c89c, author = {Victoria Vlasova}, title = {{Web skimming with Google Analytics}}, date = {2020-06-22}, organization = {Kaspersky Labs}, url = {https://securelist.com/web-skimming-with-google-analytics/97414/}, language = {English}, urldate = {2020-06-24} } Web skimming with Google Analytics
2020-06-19Kaspersky LabsDenis Legezo
@online{legezo:20200619:microcin:122f2ca, author = {Denis Legezo}, title = {{Microcin is here With asynchronous sockets, steganography, GitLab ban and a sock}}, date = {2020-06-19}, organization = {Kaspersky Labs}, url = {https://securelist.com/microcin-is-here/97353/}, language = {English}, urldate = {2020-06-21} } Microcin is here With asynchronous sockets, steganography, GitLab ban and a sock
Microcin
2020-06-17Kaspersky LabsKaspersky Lab ICS CERT
@online{cert:20200617:targeted:4a2a126, author = {Kaspersky Lab ICS CERT}, title = {{Targeted attacks on industrial companies using Snake ransomware}}, date = {2020-06-17}, organization = {Kaspersky Labs}, url = {https://ics-cert.kaspersky.com/alerts/2020/06/17/targeted-attacks-on-industrial-companies-using-snake-ransomware/}, language = {English}, urldate = {2020-06-18} } Targeted attacks on industrial companies using Snake ransomware
Snake Ransomware
2020-06-09Kaspersky LabsCostin Raiu
@online{raiu:20200609:looking:3038dce, author = {Costin Raiu}, title = {{Looking at Big Threats Using Code Similarity. Part 1}}, date = {2020-06-09}, organization = {Kaspersky Labs}, url = {https://securelist.com/big-threats-using-code-similarity-part-1/97239/}, language = {English}, urldate = {2020-08-18} } Looking at Big Threats Using Code Similarity. Part 1
Penquin Turla CCleaner Backdoor EternalPetya Regin WannaCryptor XTunnel
2020-06-03Kaspersky LabsGReAT, Mark Lechtik, Giampaolo Dedola
@online{great:20200603:cycldek:ed9a830, author = {GReAT and Mark Lechtik and Giampaolo Dedola}, title = {{Cycldek: Bridging the (air) gap}}, date = {2020-06-03}, organization = {Kaspersky Labs}, url = {https://securelist.com/cycldek-bridging-the-air-gap/97157/}, language = {English}, urldate = {2020-06-03} } Cycldek: Bridging the (air) gap
8.t Dropper NewCore RAT PlugX USBCulprit Hellsing
2020-05-28Kaspersky LabsVyacheslav Kopeytsev
@techreport{kopeytsev:20200528:steganography:8f5230a, author = {Vyacheslav Kopeytsev}, title = {{Steganography in targeted attacks on industrial enterprises}}, date = {2020-05-28}, institution = {Kaspersky Labs}, url = {https://ics-cert.kaspersky.com/media/KASPERSKY_Steganography_in_targeted_attacks_EN.pdf}, language = {English}, urldate = {2020-05-29} } Steganography in targeted attacks on industrial enterprises
MimiKatz
2020-05-28Kaspersky LabsBoris Larin, Alexey Kulaev
@online{larin:20200528:zeroday:e7fee04, author = {Boris Larin and Alexey Kulaev}, title = {{The zero-day exploits of Operation WizardOpium}}, date = {2020-05-28}, organization = {Kaspersky Labs}, url = {https://securelist.com/the-zero-day-exploits-of-operation-wizardopium/97086/}, language = {English}, urldate = {2020-05-29} } The zero-day exploits of Operation WizardOpium
2020-05-14Kaspersky LabsGReAT
@online{great:20200514:compfun:eda09d1, author = {GReAT}, title = {{COMpfun authors spoof visa application with HTTP status-based Trojan}}, date = {2020-05-14}, organization = {Kaspersky Labs}, url = {https://securelist.com/compfun-http-status-based-trojan/96874/}, language = {English}, urldate = {2020-05-14} } COMpfun authors spoof visa application with HTTP status-based Trojan
COMpfun
2020-05-08Kaspersky LabsGReAT
@online{great:20200508:naikons:f1646a6, author = {GReAT}, title = {{Naikon’s Aria}}, date = {2020-05-08}, organization = {Kaspersky Labs}, url = {https://securelist.com/naikons-aria/96899/}, language = {English}, urldate = {2020-07-06} } Naikon’s Aria
Aria-body
2020-04-28Kaspersky LabsAlexey Firsh, Lev Pikman
@online{firsh:20200428:hiding:97cbb7b, author = {Alexey Firsh and Lev Pikman}, title = {{Hiding in plain sight: PhantomLance walks into a market}}, date = {2020-04-28}, organization = {Kaspersky Labs}, url = {https://securelist.com/apt-phantomlance/96772/}, language = {English}, urldate = {2020-05-05} } Hiding in plain sight: PhantomLance walks into a market
PhantomLance
2020-04-23Kaspersky LabsKaspersky
@online{kaspersky:20200423:look:4e5d7ab, author = {Kaspersky}, title = {{A look at the ATM/PoS malware landscape from 2017-2019}}, date = {2020-04-23}, organization = {Kaspersky Labs}, url = {https://securelist.com/atm-pos-malware-landscape-2017-2019/96750/}, language = {English}, urldate = {2020-04-26} } A look at the ATM/PoS malware landscape from 2017-2019
ATMitch WinPot