Click here to download all references as Bib-File.•
| 2017-06-30
⋅
ESET Research
⋅
TeleBots are back: Supply‑chain attacks against Ukraine EternalPetya |
| 2017-06-12
⋅
ESET Research
⋅
WIN32/INDUSTROYER: A new threat for industrial control systems Industroyer Sandworm |
| 2017-06-12
⋅
ESET Research
⋅
Industroyer: Biggest threat to industrial control systems since Stuxnet Industroyer |
| 2017-05-23
⋅
ESET Research
⋅
XData ransomware making rounds amid global WannaCryptor scare Sandworm |
| 2017-05-23
⋅
ESET Research
⋅
XData ransomware making rounds amid global WannaCryptor scare XData |
| 2016-12-13
⋅
ESET Research
⋅
The rise of TeleBots: Analyzing disruptive KillDisk attacks KillDisk TeleBot Sandworm |
| 2016-12-13
⋅
ESET Research
⋅
The rise of TeleBots: Analyzing disruptive KillDisk attacks Credraptor KillDisk TeleBot |
| 2016-09-22
⋅
ESET Research
⋅
Book of Eli: African targeted attacks Book of Eli |
| 2016-05-18
⋅
ESET Research
⋅
Operation Groundbait: Espionage in Ukrainian war zones Groundbait |
| 2016-05-17
⋅
ESET Research
⋅
Operation Groundbait: Analysis of a surveillance toolkit Prikormka |
| 2015-09-08
⋅
ESET Research
⋅
Carbanak gang is back and packing new guns DRIFTPIN |
| 2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
| 2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
| 2014-11-13
⋅
ZeroNights
⋅
Roaming tiger Roaming Tiger |
| 2013-09-09
⋅
ESET Research
⋅
HESPERBOT A New, Advanced Banking Trojan in the Wild HesperBot |