Click here to download all references as Bib-File.•
2017-03-21
⋅
DomainTools
⋅
Hunt Case Study: Hunting Campaign Indicators on Privacy Protected Attack Infrastructure CopyKittens |
2017-03-21
⋅
Wired
⋅
Inside the Hunt for Russia's Most Notorious Hacker Gameover P2P |
2017-02-26
⋅
TreasureHunter : A POS Malware Case Study TreasureHunter |
2017-02-24
⋅
Some stuff about security.. Blog
⋅
Hunting Retefe with Splunk - some interesting points Retefe |
2016-11-09
⋅
Twitter (MalwareHunterTeam)
⋅
Tweet on Bandok |
2016-10-20
⋅
Twitter (@malwrhunterteam)
⋅
Tweet on Ransomware Unidentified 024 (Ransomware) |
2016-10-20
⋅
Twitter (@malwrhunterteam)
⋅
Tweet on Quasar RAT Quasar RAT |
2016-04-26
⋅
Microsoft
⋅
PLATINUM Targeted attacks in South and Southeast Asia AMTsol PLATINUM |
2016-03-28
⋅
FireEye
⋅
TREASUREHUNT: A Custom POS Malware Tool TreasureHunter |
2015-06-23
⋅
Reuters
⋅
Exclusive: SEC hunts hackers who stole corporate emails to trade stocks WOLF SPIDER |
2015-01-26
⋅
CrowdStrike
⋅
Storm Chasing: Hunting Hurricane Panda HURRICANE PANDA |
2014-11-14
⋅
Sensepost
⋅
reGeorg reGeorg |
2014-09-05
⋅
Google
⋅
Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family X-Agent |
2014-08-14
⋅
Palo Alto Networks Unit 42
⋅
Hunting the Mutex Allaple |
2014-06-23
⋅
F-Secure
⋅
Havex Hunts For ICS/SCADA Systems Havex RAT |
2014-05-01
⋅
Recorded Future
⋅
Hunting Hidden Lynx: How OSINT is Crucial for APT Analysis APT17 |
2011-07-04
⋅
Kernelmode.info Forums
⋅
WinNT/Rovnix (alias Mayachok, Cidox, BkLoader) Rovnix |
2011-03-28
⋅
KrebsOnSecurity
⋅
Microsoft Hunting Rustock Controllers Rustock |