Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-10-16AkamaiAkamei
UPnProxy: Blackhat Proxies via NAT Injections
Inception Framework
2017-09-18ThreatConnectPaul Vann
Casting a Light on BlackEnergy
BlackEnergy
2017-08-22ESET ResearchTomáš Gardoň
Gamescom 2017: It’s all fun and games until black hats step in
Joao
2017-08-18vmwareJared Myers
Threat Analysis: Carbon Black Threat Research Dissects PNG Dropper
Uroburos
2017-07-03ESET ResearchAnton Cherepanov, Robert Lipovsky
BlackEnergy – what we really know about the notorious cyber attacks
BlackEnergy
2017-06-30Kaspersky LabsGReAT
From BlackEnergy to ExPetr
EternalPetya
2017-06-22Trend MicroCH Lei, Lenart Bermejo, Razor Huang
The Trail of BlackTech’s Cyber Espionage Campaigns
bifrose KIVARS PLEAD
2017-06-22Trend MicroCH Lei, Lenart Bermejo, Razor Huang
Following the Trail of BlackTech’s Cyber Espionage Campaigns
PLEAD BlackTech
2017-06-01Trend MicroCH Lei, Lenart Bermejo, Razor Huang
Following the Trail of BlackTech’s Cyber Espionage Campaigns
PLEAD
2017-05-09VMWare Carbon BlackJared Myers
Carbon Black Threat Research Dissects Red Leaves Malware, Which Leverages DLL Side Loading
RedLeaves
2017-05-04Fidelis CybersecurityJason Reaves
Blackmoon Rising: Banking Trojan Back with New Framework
KrBanker
2016-10-27Trend MicroJoey Chen, MingYen Hsieh
BLACKGEAR Espionage Campaign Evolves, Adds Japan To Target List
Blackgear
2016-08-01Black HatClaudio Guarnieri, Collin Anderson
Iran and the Soft Warfor Internet Dominance
Infy Sima
2016-07-28BlackberryJim Walter
Petya and Mischa For All Part II: They’re Here…
Petya
2016-05-19BlackberryJim Walter
Petya and Mischa for All! The RaaS Boom Expands to Include the Petya/Mischa Combo
Petya
2016-05-01Check PointStanislav Skuratovich
Looking into Teslacrypt
TeslaCrypt
2016-04-19EndgameMark Mager
Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain
TeslaCrypt
2016-03-18MalwarebytesMalwarebytes Labs
Teslacrypt Spam Campaign: “Unpaid Issue…”
TeslaCrypt
2016-01-28Kaspersky LabsGReAT
BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents
BlackEnergy
2016-01-25Bleeping ComputerLawrence Abrams
Hidden Tear Ransomware Developer Blackmailed by Malware Developers using his Code
EDA2 HiddenTear