Click here to download all references as Bib-File.•
2015-05-07
⋅
G Data
⋅
Dissecting the “Kraken” Laziok |
2015-02-18
⋅
G Data
⋅
Babar: espionage software finally found and put under the microscope Evilbunny SNOWGLOBE |
2015-01-20
⋅
G Data
⋅
Analysis of Project Cobra Cobra Carbon System |
2015-01-15
⋅
G Data
⋅
Weiterentwicklung anspruchsvoller Spyware: von Agent.BTZ zu ComRAT Agent.BTZ |
2014-11-11
⋅
G Data
⋅
The Uroburos case: new sophisticated RAT identified Agent.BTZ Uroburos |
2014-10-31
⋅
G Data
⋅
OPERATION “TOOHASH”: HOW TARGETED ATTACKS WORK Cohhoc ProjectWood Gelsemium |
2014-10-30
⋅
G Data
⋅
COM Object hijacking: the discreet way of persistence COMpfun |
2014-07-31
⋅
G Data
⋅
Poweliks: the persistent malware without a file Poweliks |
2014-06-02
⋅
G Data
⋅
Analysis of Uroburos, using WinDbg Uroburos |
2014-05-13
⋅
G Data
⋅
Uroburos rootkit: Belgian Foreign Ministry stricken Uroburos |
2014-03-07
⋅
G Data
⋅
Uroburos – Deeper travel into kernel protection mitigation Uroburos |
2014-02-28
⋅
G Data Blog
⋅
Uroburos - highly complex espionage software with Russian roots Uroburos |