Click here to download all references as Bib-File.
2018-04-24 ⋅ McAfee ⋅ Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide Lazarus Group |
2018-03-22 ⋅ Minerva ⋅ GhostMiner: Cryptomining Malware Goes Fileless GhostMiner |
2017-12-04 ⋅ RSA ⋅ The Shadows of Ghosts Inside the response of a unique Carbanak intrusion GOTROJ MimiKatz |
2017-07-17 ⋅ Trend Micro ⋅ Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More GhostCtrl |
2017-07-17 ⋅ Secrary Blog ⋅ WMIGhost / Wimmie - WMI malware WMI Ghost |
2017-03-28 ⋅ Cylance ⋅ Threat Spotlight: GhostAdmin Malware GhostAdmin |
2017-01-17 ⋅ Bleeping Computer ⋅ New GhostAdmin Malware Used for Data Theft and Exfiltration GhostAdmin |
2016-04-22 ⋅ Cylance ⋅ The Ghost Dragon Ghost RAT |
2016-04-13 ⋅ FireEye ⋅ Ghosts in the Endpoint PLEAD |
2009-03-29 ⋅ Wikipedia ⋅ GhostNet Gh0stnet GhostNet |
2009-03-28 ⋅ Infinitum Labs ⋅ Tracking GhostNet: Investigating a Cyber Espionage Network Ghost RAT GhostNet |