Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-06-26Palo Alto Networks Unit 42Brittany Ash, Josh Grunzweig, Tom Lancaster
RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families
DDKONG PLAINTEE
2018-06-26Palo Alto Networks Unit 42Brittany Ash, Josh Grunzweig, Tom Lancaster
RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families
RANCOR
2018-06-08JPCERT/CCShusei Tomonaga
PLEAD Downloader Used by BlackTech
PLEAD
2018-05-19Xavier Mertens
Malicious Powershell Targeting UK Bank Customers
sLoad
2018-05-03ProtectWiseTom Hegel
Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers
APT41
2018-03-22MinervaAsaf Aprozper, Gal Bitensky
GhostMiner: Cryptomining Malware Goes Fileless
GhostMiner
2018-03-14ThreatpostTom Spring
New POS Malware PinkKite Takes Flight
AbaddonPOS
2018-03-13Palo Alto Networks Unit 42Alex Hinchliffe, Jen Miller-Osborn, Mike Harbison, Tom Lancaster
HenBox: The Chickens Come Home to Roost
HenBox
2018-03-06Shusei Tomonaga
Malware “TSCookie”
PLEAD
2018-02-26Opcode Security researchntopcode
Anatomy of the Process Environment Block (PEB) (Windows Internals)
2018-02-05Patrick Wardle
Analyzing OSX/CreativeUpdater a macOS cryptominer, distributed via macupdate.com
CreativeUpdater
2018-02-02MalwarebytesThomas Reed
New Mac cryptominer distributed via a MacUpdate hack
CreativeUpdater
2018-01-29Palo Alto Networks Unit 42Juan Cortes, Tom Lancaster
VERMIN: Quasar RAT and Custom Malware Used In Ukraine
Vermin
2018-01-25CrowdStrikeIan Barton, Jason Barnes, Karan Sood, Ryan McCombs
WannaMine Cryptomining: Harmless Nuisance or Disruptive Threat?
WannaMine
2018-01-24BitdefenderBogdan Botezatu
New Hide ‘N Seek IoT Botnet using custom-built Peer-to-Peer communication spotted in the wild
Hide and Seek
2018-01-23ThreatpostTom Spring
Satori Author Linked to New Mirai Variant Masuta
Masuta
2018-01-16Opcode Security researchntopcode
Anatomy of the thread suspension mechanism in Windows (Windows Internals)
2017-12-13Bleeping ComputerLawrence Abrams
WORK Cryptomix Ransomware Variant Released
CryptoMix
2017-11-14Palo Alto Networks Unit 42Tom Lancaster
Muddying the Water: Targeted Attacks in the Middle East
POWERSTATS MuddyWater
2017-11-13SecurityIntelligenceLimor Kessem, Maor Wiesen, Tal Darsan, Tomer Agayev
New Banking Trojan IcedID Discovered by IBM X-Force Research
IcedID IcedID Downloader