Click here to download all references as Bib-File.•
2011-12-08
⋅
Symantec
⋅
The Sykipot Attacks sykipot |
2011-10-31
⋅
Trend Micro
⋅
The Significance of the "Nitro" Attacks Nitro |
2011-10-26
⋅
Intego
⋅
Tsunami Backdoor Can Be Used for Denial of Service Attacks Tsunami |
2011-10-08
⋅
F-Secure
⋅
Possible Governmental Backdoor Found ("Case R2D2") Bundestrojaner |
2011-10-06
⋅
Kaspersky Labs
⋅
ZeuS-in-the-Mobile – Facts and Theories ZitMo |
2011-08-27
⋅
Microsoft
⋅
Morto.A Morto |
2011-08-09
⋅
FireEye
⋅
Harnig is Back Harnig |
2011-07-27
⋅
Contagiodump Blog
⋅
Jul 25 Mac Olyx backdoor + Gh0st Backdoor in RAR archive related to July 2009 Ürümqi riots in China (Samples included) Olyx Gh0stnet |
2011-07-10
⋅
Facts and myths about antivirus evasion with Metasploit Meterpreter |
2011-07-08
⋅
⋅
Dr.Web
⋅
Trojan.Mayachok.2: анализ первого известного VBR-буткита Rovnix |
2011-07-06
⋅
Kaspersky Labs
⋅
Cybercriminals switch from MBR to NTFS Rovnix |
2011-07-04
⋅
Kernelmode.info Forums
⋅
WinNT/Rovnix (alias Mayachok, Cidox, BkLoader) Rovnix |
2011-06-29
⋅
Symantec
⋅
Inside a Back Door Attack Ghost RAT Dust Storm |
2011-06-29
⋅
Symantec
⋅
Inside a Back Door Attack Dust Storm |
2011-06-22
⋅
Doctor Web
⋅
Criminals gain control over Mac with BackDoor.Olyx Olyx |
2011-03-02
⋅
ESET Research
⋅
TDL4 and Glupteba: Piggyback PiggyBugs Glupteba |
2011-02-24
⋅
Contagiodump Blog
⋅
ZeroAccess / Max++ / Smiscer Crimeware Rootkit sample for Step-by-Step Reverse Engineering by Giuseppe Bonfa - << (Update 2011 version available) ZeroAccess |
2011-02-10
⋅
McAfee
⋅
Global Energy Cyberattacks: “Night Dragon” Night Dragon |
2011-01-20
⋅
⋅
Beschreibung des Virus Backdoor.Win32. Buterat.afj Buterat |
2011-01-01
⋅
The Brown Journal of World Affairs
⋅
The Spectrum of National Responsibility for Cyberattacks |