Click here to download all references as Bib-File.•
| 2016-04-06
⋅
Proofpoint
⋅
Locky Ransomware Is Becoming More Sophisticated - Cybercriminals Continue Email Campaign Innovation Rockloader |
| 2016-01-01
⋅
CrowdStrike
⋅
Detecting and Responding: Pandas and Bears ELOQUENT PANDA UNION PANDA |
| 2015-12-08
⋅
The Citizenlab
⋅
Packrat: Seven Years of a South American Threat Actor AdWind Adzok CyberGate Xtreme RAT Packrat |
| 2015-11-17
⋅
SpiderLabs Blog
⋅
New Memory Scraping Technique in Cherry Picker PoS Malware CherryPicker POS |
| 2015-11-05
⋅
Kudelski Security
⋅
Sphinx Moth: Expanding our knowledge of the “Wild Neutron” / “Morpho” APT WildNeutron |
| 2015-08-31
⋅
SecurityIntelligence
⋅
Shifu: ‘Masterful’ New Banking Trojan Is Attacking 14 Japanese Banks Shifu |
| 2015-08-12
⋅
SecurityIntelligence
⋅
Tinba Trojan Sets Its Sights on Romania Tinba |
| 2015-08-10
⋅
shadowserver
⋅
The Italian Connection: An analysis of exploit supply chains and digital quartermasters smac APT20 |
| 2015-07-13
⋅
Symantec
⋅
“Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory SEADADDY |
| 2015-03-04
⋅
BriMor Labs
⋅
And you get a POS malware name...and you get a POS malware name....and you get a POS malware name.... pwnpos |
| 2014-11-21
⋅
FireEye
⋅
Operation Double Tap pirpi |
| 2014-11-12
⋅
IBM X-Force
⋅
Strela Stealer: Today’s invoice is tomorrow’s phish StrelaStealer HIVE-0145 |
| 2014-10-27
⋅
Trend Micro
⋅
Operation Pawn Storm: Using Decoys to Evade Detection Sedreco Seduploader APT28 |
| 2014-10-01
⋅
Trend Micro
⋅
Operation Pawn Storm: Using Decoys to Evade Detection |
| 2014-09-30
⋅
FireEye
⋅
OPERATION QUANTUM ENTANGLEMENT NewCT DragonOK |
| 2014-09-03
⋅
FireEye
⋅
Darwin’s Favorite APT Group EtumBot ThreeByte WaterSpout APT12 |
| 2014-08-28
⋅
Trend Micro
⋅
BIFROSE Now More Evasive Through Tor, Used for Targeted Attack bifrose |
| 2014-08-13
⋅
FireEye
⋅
OPERATION SAFFRON ROSE Flying Kitten |
| 2014-03-25
⋅
FireEye
⋅
Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370 APT30 Naikon |
| 2014-03-12
⋅
FireEye
⋅
A Detailed Examination of the Siesta Campaign APT1 Siesta |