Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-06-30ESET ResearchAnton Cherepanov
TeleBots are back: Supply‑chain attacks against Ukraine
EternalPetya
2017-06-12ESET ResearchAnton Cherepanov
WIN32/INDUSTROYER: A new threat for industrial control systems
Industroyer Sandworm
2017-06-12ESET ResearchAnton Cherepanov, Robert Lipovsky
Industroyer: Biggest threat to industrial control systems since Stuxnet
Industroyer
2017-05-23ESET ResearchAnton Cherepanov
XData ransomware making rounds amid global WannaCryptor scare
Sandworm
2017-05-23ESET ResearchAnton Cherepanov
XData ransomware making rounds amid global WannaCryptor scare
XData
2016-12-13ESET ResearchAnton Cherepanov
The rise of TeleBots: Analyzing disruptive KillDisk attacks
KillDisk TeleBot Sandworm
2016-12-13ESET ResearchAnton Cherepanov
The rise of TeleBots: Analyzing disruptive KillDisk attacks
Credraptor KillDisk TeleBot
2016-09-22ESET ResearchAnton Cherepanov
Book of Eli: African targeted attacks
Book of Eli
2016-05-18ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Groundbait: Espionage in Ukrainian war zones
Groundbait
2016-05-17ESET ResearchAnton Cherepanov
Operation Groundbait: Analysis of a surveillance toolkit
Prikormka
2015-09-08ESET ResearchAnton Cherepanov
Carbanak gang is back and packing new guns
DRIFTPIN
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC
2014-11-13ZeroNightsAnton Cherepanov
Roaming tiger
Roaming Tiger