Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-12-07Cisco TalosBen Baker, Edmund Brumaghin, Jonas Zaddach, Mariano Graziano
Floki Bot Strikes, Talos and Flashpoint Respond
FlokiBot
2016-11-14Dr.WebDr. Web
Doctor Web discovers a botnet that attacks Russian banks
2016-11-08VerintVerint Research Lab
SPAMTORTE VERSION 2: DISCOVERY OF AN ADVANCED, MULTILAYERED SPAMBOT CAMPAIGN THAT IS BACK WITH A VENGEANCE
Spamtorte
2016-09-29Cisco TalosEdmund Brumaghin
Want Tofsee My Pictures? A Botnet Gets Aggressive
Tofsee
2016-09-20AvastThreat Intelligence Team
Inside Petya and Mischa ransomware
Petya
2016-09-13CiscoJosh Reynolds
H1N1: Technical analysis reveals new capabilities
H1N1 Loader
2016-09-08Dr.WebDr.Web
Doctor Web discovers Linux Trojan written in Rust
Irc16
2016-09-07Kaspersky LabsStefan Ortloff
The Missing Piece – Sophisticated OS X Backdoor Discovered
Mokes
2016-07-28BlackberryJim Walter
Petya and Mischa For All Part II: They’re Here…
Petya
2016-07-12Joseph Landry, Udi Shamir
Malware Discovered – SFG: Furtim Malware Analysis
2016-06-10Malwarebytes Labshasherezade
Petya and Mischa: ransomware duet (part 2)
Petya
2016-05-19BlackberryJim Walter
Petya and Mischa for All! The RaaS Boom Expands to Include the Petya/Mischa Combo
Petya
2016-05-19Malwarebyteshasherezade
Petya and Mischa – Ransomware Duet (Part 1)
Petya
2016-04-28Cisco TalosBen Baker
Research Spotlight: The Resurgence of Qbot
QakBot
2016-03-23Cisco TalosCisco Talos
SamSam: The Doctor Will See You, After He Pays The Ransom
SamSam
2016-01-29Kaspersky LabsStefan Ortloff
From Linux to Windows – New Family of Cross-Platform Desktop Backdoors Discovered
Mokes Mokes
2015-11-04AvastNikolaos Chrysaidos
DroidJack isn’t the only spying software out there: Avast discovers OmniRat
OmniRAT
2015-10-06enSiloYotam Gottesman
MOKER: A NEW APT DISCOVERED WITHIN A SENSITIVE NETWORK
Moker
2015-08-05Ars TechnicaSean Gallagher
Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes”
APT27
2015-05-04Cisco TalosAlex Chiu, Ben Baker
Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors
Rombertik