Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-05-26SymantecSecurity Response
SWIFT attackers’ malware linked to more financial attacks
Contopee DYEPACK Sierra(Alfa,Bravo, ...) Lazarus Group
2016-05-26SymantecSymantec Security Response
SWIFT attackers’ malware linked to more financial attacks
Contopee Lazarus Group
2016-04-27Kaspersky LabsGReAT
Freezer Paper around Free Meat (Repackaging Open Source BeEF for Tracking and More)
Charming Kitten
2016-04-14SecurityIntelligenceLimor Kessem, Lior Keshet
Meet GozNym: The Banking Malware Offspring of Gozi ISFB and Nymaim
ISFB Nymaim GozNym
2016-04-06ProofpointChris Wakelin
Locky Ransomware Is Becoming More Sophisticated - Cybercriminals Continue Email Campaign Innovation
Rockloader
2016-01-01CrowdStrikeChristopher Scott, Wendi Whitmore
Detecting and Responding: Pandas and Bears
ELOQUENT PANDA UNION PANDA
2015-12-08The CitizenlabClaudio Guarnieri, John Scott-Railton, Marion Marschalek, Morgan Marquis-Boire
Packrat: Seven Years of a South American Threat Actor
AdWind Adzok CyberGate Xtreme RAT Packrat
2015-11-17SpiderLabs BlogEric Merritt
New Memory Scraping Technique in Cherry Picker PoS Malware
CherryPicker POS
2015-11-05Kudelski Securitykscert
Sphinx Moth: Expanding our knowledge of the “Wild Neutron” / “Morpho” APT
WildNeutron
2015-08-31SecurityIntelligenceDenis Laskov, Ilya Kolmanovich, Limor Kessem
Shifu: ‘Masterful’ New Banking Trojan Is Attacking 14 Japanese Banks
Shifu
2015-08-12SecurityIntelligenceLimor Kessem
Tinba Trojan Sets Its Sights on Romania
Tinba
2015-08-10shadowserverBen Koehl, Ned Moran
The Italian Connection: An analysis of exploit supply chains and digital quartermasters
smac APT20
2015-07-13SymantecA L Johnson
“Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory
SEADADDY
2015-03-04BriMor LabsBriMor Labs
And you get a POS malware name...and you get a POS malware name....and you get a POS malware name....
pwnpos
2014-11-21FireEyeJoshua Homan, Mike Oppenheim, Mike Scott, Ned Moran
Operation Double Tap
pirpi
2014-11-12IBM X-ForceCharlotte Hammond, Golo Mühr, Joe Fasulo
Strela Stealer: Today’s invoice is tomorrow’s phish
StrelaStealer
2014-10-27Trend MicroAlfred Remorin, Douglas Otis, Feike Hacquebord, Fernando Mercês, Jim Gogolinski, Loucif Kharouni, Numaan Huq
Operation Pawn Storm: Using Decoys to Evade Detection
Sedreco Seduploader APT28
2014-10-01Trend MicroAlfred Remorin, Douglas Otis, Feike Hacquebord, Fernando Mercês, Jim Gogolinski, Loucif Kharouni, Numaan Huq
Operation Pawn Storm: Using Decoys to Evade Detection
2014-09-30FireEyeMike Scott, Ned Moran, Sai Vashisht, Thoufique Haq
OPERATION QUANTUM ENTANGLEMENT
NewCT DragonOK
2014-09-03FireEyeMike Oppenheim, Ned Moran
Darwin’s Favorite APT Group
EtumBot ThreeByte WaterSpout APT12