Click here to download all references as Bib-File.•
2019-01-01
⋅
Journal of Telecommunications and Information Technology
⋅
WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms WannaCryptor |
2019-01-01
⋅
Saudi Arabia CNA
⋅
Destructive Attack “DUSTMAN” Technical Report DUSTMAN |
2019-01-01
⋅
Virus Bulletin
⋅
VB2018 paper: From Hacking Team to hacked team to...? RCS |
2019-01-01
⋅
LinkedIn Irfan Asrar
⋅
Destructive Attack "Dustman" Technical Report DUSTMAN |
2019-01-01
⋅
UltraHacks
⋅
Raccoon Stealer – onion panel Raccoon |
2019-01-01
⋅
Malwarebytes
⋅
Ransom.Megacortex MegaCortex |
2019-01-01
⋅
Virus Bulletin
⋅
A vine climbing over the Great Firewall: A long-term attack against China Poison Ivy ZXShell |
2019-01-01
⋅
CISA
⋅
HIDDEN COBRA - North Korean Malicious Cyber Activity Lazarus Group |
2019-01-01
⋅
MITRE
⋅
Group description: Dark Caracal Dark Caracal |
2019-01-01
⋅
Council on Foreign Relations
⋅
Lotus Blossom LOTUS PANDA |
2019-01-01
⋅
Council on Foreign Relations
⋅
Mustang Panda MUSTANG PANDA |
2019-01-01
⋅
Council on Foreign Relations
⋅
APT 10 APT10 |
2019-01-01
⋅
Council on Foreign Relations
⋅
Inception Framework Inception Framework |
2019-01-01
⋅
Council on Foreign Relations
⋅
Onion Dog OnionDog |
2019-01-01
⋅
Council on Foreign Relations
⋅
HenBox HenBox |
2019-01-01
⋅
Council on Foreign Relations
⋅
Duqu 2.0 Unit 8200 |
2019-01-01
⋅
Council on Foreign Relations
⋅
MuddyWater MuddyWater |
2019-01-01
⋅
Council on Foreign Relations
⋅
Axiom |
2019-01-01
⋅
Council on Foreign Relations
⋅
Operation GhostSecret Lazarus Group |
2019-01-01
⋅
Council on Foreign Relations
⋅
Machete El Machete |