Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-02-27ThreatConnectThreatConnect Research Team
@online{team:20150227:anthem:3576532, author = {ThreatConnect Research Team}, title = {{The Anthem Hack: All Roads Lead to China}}, date = {2015-02-27}, organization = {ThreatConnect}, url = {https://www.threatconnect.com/the-anthem-hack-all-roads-lead-to-china/}, language = {English}, urldate = {2020-01-09} } The Anthem Hack: All Roads Lead to China
Derusbi
2015-02-27ThreatConnectThreatConnect Research Team
@online{team:20150227:anthem:ac7d814, author = {ThreatConnect Research Team}, title = {{The Anthem Hack: All Roads Lead to China}}, date = {2015-02-27}, organization = {ThreatConnect}, url = {https://threatconnect.com/blog/the-anthem-hack-all-roads-lead-to-china/}, language = {English}, urldate = {2020-04-06} } The Anthem Hack: All Roads Lead to China
HttpBrowser
2015-02-25Trend MicroTrend Micro Threat Research Team
@techreport{team:20150225:operation:3300d1e, author = {Trend Micro Threat Research Team}, title = {{OPERATION ARID VIPER: Bypassing the Iron Dome}}, date = {2015-02-25}, institution = {Trend Micro}, url = {http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf}, language = {English}, urldate = {2020-01-09} } OPERATION ARID VIPER: Bypassing the Iron Dome
AridViper
2014-09-04ClearSkyClearSky Research Team
@online{team:20140904:gholee:9f6be42, author = {ClearSky Research Team}, title = {{Gholee – a “protective edge” themed spear phishing campaign}}, date = {2014-09-04}, organization = {ClearSky}, url = {https://www.clearskysec.com/gholee-a-protective-edge-themed-spear-phishing-campaign/}, language = {English}, urldate = {2020-01-10} } Gholee – a “protective edge” themed spear phishing campaign
Ghole
2014-08-29FireEyeKyle Wilhoit, Thoufique Haq
@online{wilhoit:20140829:connecting:89f1651, author = {Kyle Wilhoit and Thoufique Haq}, title = {{Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks}}, date = {2014-08-29}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2014/08/connecting-the-dots-syrian-malware-team-uses-blackworm-for-attacks.html}, language = {English}, urldate = {2019-12-20} } Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks
Blackworm RAT
2014-08-14Palo Alto Networks Unit 42Unit 42 Team
@online{team:20140814:hunting:1131839, author = {Unit 42 Team}, title = {{Hunting the Mutex}}, date = {2014-08-14}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2014/08/hunting-mutex/}, language = {English}, urldate = {2019-10-14} } Hunting the Mutex
Allaple
2014-08-07NetScoutASERT Team
@online{team:20140807:innaput:a2516ed, author = {ASERT Team}, title = {{Innaput Actors Utilize Remote Access Trojan Since 2016, Presumably Targeting Victim Files}}, date = {2014-08-07}, organization = {NetScout}, url = {https://asert.arbornetworks.com/innaput-actors-utilize-remote-access-trojan-since-2016-presumably-targeting-victim-files/}, language = {English}, urldate = {2019-10-23} } Innaput Actors Utilize Remote Access Trojan Since 2016, Presumably Targeting Victim Files
InnaputRAT
2014-07-07QianxinRed Raindrop Team
@online{team:20140707:analysis:e586631, author = {Red Raindrop Team}, title = {{Analysis and disclosure of the CIA's cyber arsenal}}, date = {2014-07-07}, organization = {Qianxin}, url = {https://ti.qianxin.com/blog/articles/network-weapons-of-cia/}, language = {Chinese}, urldate = {2019-12-19} } Analysis and disclosure of the CIA's cyber arsenal
Lambert
2014-06-09CrowdStrikeCrowdstrike Global intelliGenCe team
@techreport{team:20140609:crowdstrike:21f5399, author = {Crowdstrike Global intelliGenCe team}, title = {{CrowdStrike Intelligence Report: Putter Panda}}, date = {2014-06-09}, institution = {CrowdStrike}, url = {http://cdn0.vox-cdn.com/assets/4589853/crowdstrike-intelligence-report-putter-panda.original.pdf}, language = {English}, urldate = {2020-01-09} } CrowdStrike Intelligence Report: Putter Panda
Putter Panda
2014-04-21WikipediaVarious
@online{various:20140421:hacking:648b7ca, author = {Various}, title = {{Hacking Team}}, date = {2014-04-21}, organization = {Wikipedia}, url = {https://en.wikipedia.org/wiki/Hacking_Team}, language = {English}, urldate = {2020-01-08} } Hacking Team
Hacking Team
2014-02-14SecureworksCounter Threat Unit ResearchTeam
@online{researchteam:20140214:analysis:0417082, author = {Counter Threat Unit ResearchTeam}, title = {{Analysis of DHS NCCIC Indicators}}, date = {2014-02-14}, organization = {Secureworks}, url = {https://www.secureworks.com/research/analysis-of-dhs-nccic-indicators}, language = {English}, urldate = {2020-05-26} } Analysis of DHS NCCIC Indicators
jspRAT BeepService DDKeylogger LinseningSvr ONHAT SimpleFileMover ZiyangRAT
2014Trend MicroTrend Micro Threat Research Team
@online{team:2014:operation:04bda8b, author = {Trend Micro Threat Research Team}, title = {{Operation Arid Viper - Bypassing the Iron Dome}}, date = {2014}, organization = {Trend Micro}, url = {https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/lazarus-resurfaces-targets-global-banks-bitcoin-users/#atricle-content}, language = {English}, urldate = {2019-10-23} } Operation Arid Viper - Bypassing the Iron Dome
CoreDN
2013-06CrowdStrikeCrowdstrike Global intelliGenCe team
@techreport{team:201306:deep:fa9b41d, author = {Crowdstrike Global intelliGenCe team}, title = {{DEEP PANDA}}, date = {2013-06}, institution = {CrowdStrike}, url = {http://cybercampaigns.net/wp-content/uploads/2013/06/Deep-Panda.pdf}, language = {English}, urldate = {2019-12-17} } DEEP PANDA
Shell Crew
2013-05-20AvastThreat Intelligence Team
@online{team:20130520:lockscreen:22b0503, author = {Threat Intelligence Team}, title = {{Lockscreen Win32:Lyposit displayed as a fake MacOs app}}, date = {2013-05-20}, organization = {Avast}, url = {https://blog.avast.com/2013/05/20/lockscreen-win32lyposit-displayed-as-a-fake-macos-app/}, language = {English}, urldate = {2020-01-10} } Lockscreen Win32:Lyposit displayed as a fake MacOs app
Lyposit
2013-03-20Kaspersky LabsGReAT
@techreport{great:20130320:teamspy:10e8000, author = {GReAT}, title = {{The ‘TeamSpy’ Story -Abusing TeamViewer in Cyberespionage Campaigns}}, date = {2013-03-20}, institution = {Kaspersky Labs}, url = {https://d2538mqrb7brka.cloudfront.net/wp-content/uploads/sites/43/2018/03/20134928/theteamspystory_final_t2.pdf}, language = {English}, urldate = {2020-01-08} } The ‘TeamSpy’ Story -Abusing TeamViewer in Cyberespionage Campaigns
TeamSpy Crew
2013-03-20Kaspersky LabsGReAT
@online{great:20130320:teamspy:2e6f353, author = {GReAT}, title = {{The TeamSpy Crew Attacks – Abusing TeamViewer for Cyberespionage}}, date = {2013-03-20}, organization = {Kaspersky Labs}, url = {https://securelist.com/blog/incidents/35520/the-teamspy-crew-attacks-abusing-teamviewer-for-cyberespionage-8/}, language = {English}, urldate = {2019-12-20} } The TeamSpy Crew Attacks – Abusing TeamViewer for Cyberespionage
TeamSpy Crew
2013-03-20CrySyS LabCrySyS Lab
@techreport{lab:20130320:teamspy:d2d8b88, author = {CrySyS Lab}, title = {{TeamSpy –Obshie manevri. Ispolzovat' tolko s razreshenija S-a.}}, date = {2013-03-20}, institution = {CrySyS Lab}, url = {https://www.crysys.hu/publications/files/teamspy.pdf}, language = {English}, urldate = {2020-01-08} } TeamSpy –Obshie manevri. Ispolzovat' tolko s razreshenija S-a.
TeamSpy Crew
2013-03-20Dennis Fisher
@online{fisher:20130320:researchers:dcff6dc, author = {Dennis Fisher}, title = {{Researchers Uncover ‘TeamSpy’ Attack Campaign Against Government, Research Targets}}, date = {2013-03-20}, url = {https://threatpost.com/researchers-uncover-teamspy-attack-campaign-targeting-government-research-targets-032013/77646/}, language = {English}, urldate = {2019-11-20} } Researchers Uncover ‘TeamSpy’ Attack Campaign Against Government, Research Targets
TeamSpy Crew
2012-08-23Trend MicroThreat Research Team
@techreport{team:20120823:taidoor:a46f2c9, author = {Threat Research Team}, title = {{The Taidoor Campaign: AN IN-DEPTH ANALYSIS}}, date = {2012-08-23}, institution = {Trend Micro}, url = {https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp_the_taidoor_campaign.pdf}, language = {English}, urldate = {2020-01-10} } The Taidoor Campaign: AN IN-DEPTH ANALYSIS
taidoor Taidoor
2012-03-26Trend MicroTrend Micro Forward Looking Research Team
@online{team:20120326:luckycat:b7b4f63, author = {Trend Micro Forward Looking Research Team}, title = {{LUCKYCAT REDUX Inside an APT Campaign with Multiple Targets in India and Japan}}, date = {2012-03-26}, organization = {Trend Micro}, url = {https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/luckycat-redux-campaign-attacks-multiple-targets-in-india-and-japan}, language = {English}, urldate = {2020-01-23} } LUCKYCAT REDUX Inside an APT Campaign with Multiple Targets in India and Japan
Sparksrv