Click here to download all references as Bib-File.•
2019-11-21
⋅
G Data
⋅
STOP Ransomware: Finger weg von illegalen Software-Downloads STOP |
2019-11-21
⋅
G Data
⋅
New SectopRAT: Remote access malware utilizes second desktop to control browsers SectopRAT |
2019-07-16
⋅
G Data
⋅
Analysis: Server-side polymorphism & PowerShell backdoors Rozena |
2019-05-09
⋅
G Data
⋅
Strange Bits: HTML Smuggling and GitHub Hosted Malware DanaBot |
2019-04-30
⋅
ClearSky
⋅
Raw Threat Intelligence 2019-04-30: Oilrig data dump link analysis SpyNote OopsIE |
2018-06-29
⋅
G Data
⋅
Where we go, we don't need files: Analysis of fileless malware "Rozena" Rozena |
2018-05-18
⋅
Lookout
⋅
Stealth Mango and Tangelo: Nation state mobile surveillanceware stealing data from military & government officials Stealth Mango Stealth Mango and Tangelo |
2017-10-12
⋅
G Data
⋅
Emotet beutet Outlook aus Emotet |
2017-08-01
⋅
Malwarebytes
⋅
TrickBot comes up with new tricks: attacking Outlook and browsing data TrickBot |
2017-07-20
⋅
G Data
⋅
Rurktar - Spyware under Construction Rurktar |
2017-07-11
⋅
⋅
G Data
⋅
Ordinypt hat es auf Benutzer aus Deutschland abgesehen Ordinypt |
2017-07-03
⋅
G Data
⋅
Who is behind Petna? EternalPetya |
2017-06-22
⋅
G Data
⋅
Analysis Results of Zeus.Variant.Panda PandaBanker |
2017-05-12
⋅
G Data
⋅
Warning: Massive "WannaCry" Ransomware campaign launched WannaCryptor |
2017-01-18
⋅
G Data
⋅
Spora - the Shortcut Worm that is also a Ransomware Spora |
2016-11-23
⋅
G Data
⋅
Analysis: Ursnif - spying on your data since 2007 Gozi |
2016-04-11
⋅
G Data
⋅
Manamecrypt – a ransomware that takes a different route ManameCrypt |
2015-05-07
⋅
G Data
⋅
Dissecting the “Kraken” Laziok |
2015-02-18
⋅
G Data
⋅
Babar: espionage software finally found and put under the microscope Evilbunny SNOWGLOBE |
2015-01-20
⋅
G Data
⋅
Analysis of Project Cobra Cobra Carbon System |
2015-01-15
⋅
G Data
⋅
Weiterentwicklung anspruchsvoller Spyware: von Agent.BTZ zu ComRAT Agent.BTZ |
2014-11-11
⋅
G Data
⋅
The Uroburos case: new sophisticated RAT identified Agent.BTZ Uroburos |
2014-10-31
⋅
G Data
⋅
OPERATION “TOOHASH”: HOW TARGETED ATTACKS WORK Cohhoc ProjectWood Gelsemium |
2014-10-30
⋅
G Data
⋅
COM Object hijacking: the discreet way of persistence COMpfun |
2014-07-31
⋅
G Data
⋅
Poweliks: the persistent malware without a file Poweliks |
2014-06-02
⋅
G Data
⋅
Analysis of Uroburos, using WinDbg Uroburos |
2014-05-13
⋅
G Data
⋅
Uroburos rootkit: Belgian Foreign Ministry stricken Uroburos |
2014-03-07
⋅
G Data
⋅
Uroburos – Deeper travel into kernel protection mitigation Uroburos |
2014-02-28
⋅
G Data Blog
⋅
Uroburos - highly complex espionage software with Russian roots Uroburos |