Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-11-21G DataG Data
New SectopRAT: Remote access malware utilizes second desktop to control browsers
SectopRAT
2019-07-16G DataG DATA Security Lab
Analysis: Server-side polymorphism & PowerShell backdoors
Rozena
2019-05-09G DataG-Data
Strange Bits: HTML Smuggling and GitHub Hosted Malware
DanaBot
2019-04-30ClearSkyClearSky Cyber Security
Raw Threat Intelligence 2019-04-30: Oilrig data dump link analysis
SpyNote OopsIE
2018-06-29G DataG-Data
Where we go, we don't need files: Analysis of fileless malware "Rozena"
Rozena
2018-05-18LookoutAndrew Blaich, Michael Flossman
Stealth Mango and Tangelo: Nation state mobile surveillanceware stealing data from military & government officials
Stealth Mango Stealth Mango and Tangelo
2017-10-12G DataG Data
Emotet beutet Outlook aus
Emotet
2017-08-01MalwarebytesMalwarebytes Labs
TrickBot comes up with new tricks: attacking Outlook and browsing data
TrickBot
2017-07-20G DataG Data
Rurktar - Spyware under Construction
Rurktar
2017-07-11G DataG Data
Ordinypt hat es auf Benutzer aus Deutschland abgesehen
Ordinypt
2017-07-03G DataG Data
Who is behind Petna?
EternalPetya
2017-06-22G DataLuca Ebach
Analysis Results of Zeus.Variant.Panda
PandaBanker
2017-05-12G DataG Data
Warning: Massive "WannaCry" Ransomware campaign launched
WannaCryptor
2017-01-18G DataKarsten Hahn
Spora - the Shortcut Worm that is also a Ransomware
Spora
2016-11-23G DataG Data
Analysis: Ursnif - spying on your data since 2007
Gozi
2016-04-11G DataG Data
Manamecrypt – a ransomware that takes a different route
ManameCrypt
2015-05-07G DataG Data
Dissecting the “Kraken”
Laziok
2015-02-18G DataG Data
Babar: espionage software finally found and put under the microscope
Evilbunny SNOWGLOBE
2015-01-20G DataG Data
Analysis of Project Cobra
Cobra Carbon System
2015-01-15G DataG Data
Weiterentwicklung anspruchsvoller Spyware: von Agent.BTZ zu ComRAT
Agent.BTZ
2014-11-11G DataG Data
The Uroburos case: new sophisticated RAT identified
Agent.BTZ Uroburos
2014-10-31G DataG Data
OPERATION “TOOHASH”: HOW TARGETED ATTACKS WORK
Cohhoc ProjectWood Gelsemium
2014-10-30G DataG Data
COM Object hijacking: the discreet way of persistence
COMpfun
2014-07-31G DataG Data
Poweliks: the persistent malware without a file
Poweliks
2014-06-02G DataG Data
Analysis of Uroburos, using WinDbg
Uroburos
2014-05-13G DataG Data
Uroburos rootkit: Belgian Foreign Ministry stricken
Uroburos
2014-03-07G DataG Data
Uroburos – Deeper travel into kernel protection mitigation
Uroburos
2014-02-28G Data BlogG Data
Uroburos - highly complex espionage software with Russian roots
Uroburos