Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2013-08-23FireEyeNart Villeneuve, Ned Moran, Thoufique Haq
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy
Poison Ivy Molerats
2013-08-12FireEyeNart Villeneuve, Ned Moran
Survival of the Fittest: New York Times Attackers Evolve Quickly
yayih
2013-08-07RSALimor Kessem
Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux #INTH3WILD
Hand of Thief
2013-05-20FireEyeNed Moran
Ready for Summer: The Sunshop Campaign
9002 RAT
2013-05-01Norman SharkJonathan Camp, Morten Kråkvik, Ned Moran, Snorre Fagerland
Operation Hangover
Smackdown
2013-05-01Norman SharkJonathan Camp, Morten Kråkvik, Ned Moran, Snorre Fagerland
Operation Hangover
Smackdown
2013-04-11Kaspersky LabsGReAT
Winnti. More than just a game
APT41
2013-04-11Kaspersky LabsGReAT
Winnti FAQ. More Than Just a Game
APT41
2013-04-01FireEyeRong Hwa Chong
Trojan.APT.BaneChant: In-Memory Trojan That Observes for Multiple Mouse Clicks
2013-04-01Kaspersky LabsGReAT
Winnti - More than just a game
portless Winnti
2013-02-08VMWare Carbon BlackPatrick Morley
Bit9 and Our Customers’ Security
APT17
2013-01-19SpamhausThomas Morrison
Cooperative Efforts To Shut Down Virut Botnet
Virut
2013-01-02Eric Romang
Capstone Turbine Corporation Also Targeted in the CFR Watering Hole Attack And More
APT19
2012-12-12Volatility LabsMichael Hale Ligh
Unpacking Dexter POS "Memory Dump Parsing" Malware
Dexter
2012-02-15Security IntelligenceAmit Klein
Merchant of Fraud Returns: Shylock Polymorphic Financial Malware Infections on the Rise
Shylock
2011-08-29Contagiodump BlogMila Parkour
Aug 28 Morto / Tsclient - RDP worm with DDoS features
Morto
2011-08-28F-SecureMikko Hyppönen
Windows Remote Desktop Worm "Morto" Spreading
Morto
2011-08-27MicrosoftMatt McCormack
Morto.A
Morto
2009-11-11MalekalMalekal Morte
Trojan:Win32/Opachki : redirections Google
Opachki