Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-10-26SymantecSymantec Security Response
@online{response:20151026:duuzer:49ffa2d, author = {Symantec Security Response}, title = {{Duuzer back door Trojan targets South Korea to take over computers}}, date = {2015-10-26}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/duuzer-back-door-trojan-targets-south-korea-take-over-computers}, language = {English}, urldate = {2020-01-09} } Duuzer back door Trojan targets South Korea to take over computers
Lazarus Group
2015-09-24SymantecSymantec Security Response
@online{response:20150924:kovter:9602c6b, author = {Symantec Security Response}, title = {{Kovter malware learns from Poweliks with persistent fileless registry update}}, date = {2015-09-24}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/kovter-malware-learns-poweliks-persistent-fileless-registry-update}, language = {English}, urldate = {2020-01-13} } Kovter malware learns from Poweliks with persistent fileless registry update
Kovter
2015-08-27SymantecSymantec Security Response
@techreport{response:20150827:regin:5a5257b, author = {Symantec Security Response}, title = {{Regin: Top-tier espionage tool enables stealthy surveillance}}, date = {2015-08-27}, institution = {Symantec}, url = {https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/regin-top-tier-espionage-tool-15-en.pdf}, language = {English}, urldate = {2020-01-20} } Regin: Top-tier espionage tool enables stealthy surveillance
Regin
2015-07-08SymantecSymantec Security Response
@online{response:20150708:butterfly:6bf6652, author = {Symantec Security Response}, title = {{Butterfly: Profiting from high-level corporate attacks}}, date = {2015-07-08}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/butterfly-profiting-high-level-corporate-attacks}, language = {English}, urldate = {2020-01-08} } Butterfly: Profiting from high-level corporate attacks
WildNeutron
2015-02-24SymantecSymantec Security Response
@techreport{response:20150224:w32ramnit:3a2fed3, author = {Symantec Security Response}, title = {{W32.Ramnit analysis}}, date = {2015-02-24}, institution = {Symantec}, url = {https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/w32-ramnit-analysis-15-en.pdf}, language = {English}, urldate = {2019-12-17} } W32.Ramnit analysis
Ramnit
2014-10-14SymantecSymantec Security Response
@online{response:20141014:sandworm:c129395, author = {Symantec Security Response}, title = {{Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks}}, date = {2014-10-14}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/sandworm-windows-zero-day-vulnerability-being-actively-exploited-targeted-attacks}, language = {English}, urldate = {2020-01-08} } Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks
Sandworm
2014-10-14SymantecSymantec Security Response
@online{response:20141014:sandworm:3f6e951, author = {Symantec Security Response}, title = {{Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks}}, date = {2014-10-14}, organization = {Symantec}, url = {https://web.archive.org/web/20141016132823/https://www.symantec.com/connect/blogs/sandworm-windows-zero-day-vulnerability-being-actively-exploited-targeted-attacks}, language = {English}, urldate = {2020-04-21} } Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks
Sandworm
2014-10-14SymantecSymantec Security Response
@online{response:20141014:security:9bb4cd5, author = {Symantec Security Response}, title = {{Security vendors take action against Hidden Lynx malware}}, date = {2014-10-14}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/security-vendors-take-action-against-hidden-lynx-malware}, language = {English}, urldate = {2020-01-07} } Security vendors take action against Hidden Lynx malware
HiKit Aurora Panda
2014-10-14SymantecSymantec Security Response
@online{response:20141014:security:81c5ea5, author = {Symantec Security Response}, title = {{Security vendors take action against Hidden Lynx malware}}, date = {2014-10-14}, organization = {Symantec}, url = {https://web.archive.org/web/20141016080249/http://www.symantec.com/connect/blogs/security-vendors-take-action-against-hidden-lynx-malware}, language = {English}, urldate = {2020-04-21} } Security vendors take action against Hidden Lynx malware
Gameover P2P HiKit Shylock Aurora Panda
2014-07-07SymantecSymantec Security Response
@techreport{response:20140707:dragonfly:9cd61f0, author = {Symantec Security Response}, title = {{Dragonfly: Cyberespionage Attacks Against Energy Suppliers}}, date = {2014-07-07}, institution = {Symantec}, url = {http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf}, language = {English}, urldate = {2020-01-08} } Dragonfly: Cyberespionage Attacks Against Energy Suppliers
Energetic Bear
2013-09-17SymantecSymantec Security Response
@online{response:20130917:hidden:e91b6bb, author = {Symantec Security Response}, title = {{Hidden Lynx – Professional Hackers for Hire}}, date = {2013-09-17}, organization = {Symantec}, url = {https://web.archive.org/web/20130920000343/https://www.symantec.com/connect/blogs/hidden-lynx-professional-hackers-hire}, language = {English}, urldate = {2020-04-21} } Hidden Lynx – Professional Hackers for Hire
Aurora Panda
2013-06-26SymantecSymantec Security Response
@online{response:20130626:four:cd9ccb5, author = {Symantec Security Response}, title = {{Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War}}, date = {2013-06-26}, organization = {Symantec}, url = {https://web.archive.org/web/20130701021735/https://www.symantec.com/connect/blogs/four-years-darkseoul-cyberattacks-against-south-korea-continue-anniversary-korean-war}, language = {English}, urldate = {2020-04-21} } Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War
Lazarus Group
2013-02-19SymantecSymantec Security Response
@online{response:20130219:apt1:08c1ae6, author = {Symantec Security Response}, title = {{APT1: Q&A on Attacks by the Comment Crew}}, date = {2013-02-19}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/apt1-qa-attacks-comment-crew}, language = {English}, urldate = {2019-12-18} } APT1: Q&A on Attacks by the Comment Crew
Comment Crew
2012-08-16SymantecSymantec Security Response
@online{response:20120816:shamoon:7eedf8f, author = {Symantec Security Response}, title = {{The Shamoon Attacks}}, date = {2012-08-16}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/shamoon-attacks}, language = {English}, urldate = {2020-01-13} } The Shamoon Attacks
OilRig
2012-08-16SymantecSymantec Security Response
@online{response:20120816:shamoon:8f8fe97, author = {Symantec Security Response}, title = {{The Shamoon Attacks}}, date = {2012-08-16}, organization = {Symantec}, url = {https://web.archive.org/web/20120818235442/https://www.symantec.com/connect/blogs/shamoon-attacks}, language = {English}, urldate = {2020-04-21} } The Shamoon Attacks
DistTrack OilRig
2012-07-17SymantecSymantec Security Response
@online{response:20120717:madi:e5495bd, author = {Symantec Security Response}, title = {{The Madi Attacks: Series of Social Engineering Campaigns}}, date = {2012-07-17}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/madi-attacks-series-social-engineering-campaigns}, language = {English}, urldate = {2019-12-18} } The Madi Attacks: Series of Social Engineering Campaigns
Madi