Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-11-01Bleeping ComputerCatalin Cimpanu
CryptoShuffler Stole $150,000 by Replacing Bitcoin Wallet IDs in PC Clipboards
CryptoShuffler
2017-11-01Kaspersky LabsGReAT
Silence – a new Trojan attacking financial organizations
Silence Silence group
2017-10-31McAfeeXiaobing Lin
Expiro Malware Is Back and Even Harder to Remove
Expiro
2017-10-31Bleeping ComputerLawrence Abrams
ONI Ransomware Used in Month-Long Attacks Against Japanese Companies
Oni
2017-10-30Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
Gaza Cybergang – updated activity in 2017:
Molerats
2017-10-30ESET ResearchFrédéric Vachon
Windigo Still not Windigone: An Ebury Update
Ebury
2017-10-29quangnh89
Sality Configuration Extractor (sality_extractor.py)
Sality
2017-10-27Palo Alto Networks Unit 42Unit42
Tracking Subaat: Targeted Phishing Attack Leads to Threat Actor’s Repository
The Gorgon Group
2017-10-27Independent.co.ukAdam Withnall
British security minister says North Korea was behind WannaCry hack on NHS
WannaCryptor
2017-10-27Palo Alto Networks Unit 42Unit 42
Tracking Subaat: Targeted Phishing Attack Leads to Threat Actor’s Repository
2017-10-26RiskIQYonathan Klijnsma
New htpRAT Gives Complete Remote Control Capabilities to Chinese Cyber Threat Actors
htpRAT
2017-10-26MacworldLiviu Arsene
Keranger: the first “in-the-wild” ransomware for Macs. But certainly not the last
KeRanger
2017-10-26FireEyeBarry Vengerik, Ben Read, Brian Mordosky, Christopher Glyer, Ian Ahl, Matt Williams, Michael Matonis, Nick Carr
BACKSWING - Pulling a BADRABBIT Out of a Hat
EternalPetya
2017-10-25RiskIQYonathan Klijnsma
Down the Rabbit Hole: Tracking the BadRabbit Ransomware to a Long Ongoing Campaign of Target Selection
EternalPetya
2017-10-24ESET ResearchMarc-Etienne M.Léveillé
Bad Rabbit: Not‑Petya is back with improved ransomware
EternalPetya
2017-10-20SymantecCritical Attack Discovery and Intelligence Team
Dragonfly: Western energy sector targeted by sophisticated attack group
Dorshel Goodor Heriplor Karagany Listrix ENERGETIC BEAR
2017-10-20LookoutMichael Flossman
JadeRAT mobile surveillanceware spikes in espionage activity
JadeRAT
2017-10-20ESET ResearchESET Research
OSX/Proton spreading again through supply‑chain attack
Proton RAT
2017-10-20SymantecSecurity Response Attack Investigation Team
Dragonfly: Western energy sector targeted by sophisticated attack group
Dorshel Heriplor Karagany Listrix
2017-10-20SymantecSecurity Response Attack Investigation Team
Dragonfly: Western energy sector targeted by sophisticated attack group
ENERGETIC BEAR