Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-11-07Trend MicroTrendmicro
@online{trendmicro:20171107:redbaldknightbronze:f7c817f, author = {Trendmicro}, title = {{REDBALDKNIGHT/BRONZE BUTLER’s Daserf Backdoor Now Using Steganography}}, date = {2017-11-07}, organization = {Trend Micro}, url = {http://blog.trendmicro.com/trendlabs-security-intelligence/redbaldknight-bronze-butler-daserf-backdoor-now-using-steganography/}, language = {English}, urldate = {2019-11-27} } REDBALDKNIGHT/BRONZE BUTLER’s Daserf Backdoor Now Using Steganography
Daserf Datper xxmm
2017-06-29Trend MicroTrendmicro
@online{trendmicro:20170629:information:516eaf3, author = {Trendmicro}, title = {{Information Stealer Found Hitting Israeli Hospitals}}, date = {2017-06-29}, organization = {Trend Micro}, url = {http://blog.trendmicro.com/trendlabs-security-intelligence/information-stealer-found-hitting-israeli-hospitals/}, language = {English}, urldate = {2020-01-07} } Information Stealer Found Hitting Israeli Hospitals
Retadup
2017-04-19Trend MicroTrendmicro
@online{trendmicro:20170419:of:1656f97, author = {Trendmicro}, title = {{Of Pigs and Malware: Examining a Possible Member of the Winnti Group}}, date = {2017-04-19}, organization = {Trend Micro}, url = {http://blog.trendmicro.com/trendlabs-security-intelligence/pigs-malware-examining-possible-member-winnti-group/}, language = {English}, urldate = {2019-12-04} } Of Pigs and Malware: Examining a Possible Member of the Winnti Group
Winnti
2015-09-17Trend MicroTrendmicro
@techreport{trendmicro:20150917:operation:e14b193, author = {Trendmicro}, title = {{Operation Iron Tiger: Exploring Chinese Cyber-Espionage Attacks on United States Defense Contractors}}, date = {2015-09-17}, institution = {Trend Micro}, url = {https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2015/2015.09.17.Operation_Iron_Tiger/Operation%20Iron%20Tiger%20Appendix.pdf}, language = {English}, urldate = {2020-01-07} } Operation Iron Tiger: Exploring Chinese Cyber-Espionage Attacks on United States Defense Contractors
EMISSARY PANDA
2015-02-18Trend MicroTrendmicro
@online{trendmicro:20150218:sexually:52507ce, author = {Trendmicro}, title = {{Sexually Explicit Material Used as Lures in Recent Cyber Attacks}}, date = {2015-02-18}, organization = {Trend Micro}, url = {https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/sexually-explicit-material-used-as-lures-in-cyber-attacks?linkId=12425812}, language = {English}, urldate = {2020-01-08} } Sexually Explicit Material Used as Lures in Recent Cyber Attacks
AridViper
2014-09-03Trend MicroTrendmicro
@online{trendmicro:20140903:aldibot:e165a6f, author = {Trendmicro}, title = {{ALDIBOT}}, date = {2014-09-03}, organization = {Trend Micro}, url = {https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/aldibot}, language = {English}, urldate = {2019-12-02} } ALDIBOT
Aldibot