Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-10-07Team CymruBrian Eckman
GhostDNSbusters (Part 2)
2020-09-25NetlabAlex Turing, Hui Wang
Ghost in action: the Specter botnet
Specter
2020-09-08Team CymruCERT-BR, Manabu Niseki, Nick Byers
GhostDNSbusters: Illuminating GhostDNS Infrastructure
2020-07-29FireEyeDavid Mainor, Gabby Roncone, Lee Foster, Sam Riddell
'Ghostwriter' Influence Campaign: Unknown Actors Leverage Website Compromises and Fabricated Content to Push Narratives Aligned With Russian Security Interests
Ghostwriter
2020-07-29MandiantMandiant
‘Ghostwriter’ Influence Campaign: Unknown Actors Leverage Website Compromises and Fabricated Content to Push Narratives Aligned with Russian Security Interests
2020-07-02AhnLabAhnLab ASEC Analysis Team
Malicious Hangul Word Processor Files Exploiting Ghostscript Vulnerability
2020-05-20Avast DecodedAlexej Savčin, David Jursa, Jan Rubín, Simi Musilova
GhostDNS Source Code Leaked
2019-10-17ESET ResearchMathieu Tartare, Matthieu Faou, Thomas Dupuy
OPERATION GHOST The Dukes aren’t back — they never left
FatDuke
2019-10-17ESET ResearchESET Research
Operation Ghost: The Dukes aren’t back – they never left
PolyglotDuke
2019-09-19Trend MicroMaverick Pascual
Fileless Cryptocurrency-Miner GhostMiner Weaponizes WMI Objects, Kills Other Cryptocurrency-Mining Payloads
GhostMiner
2019-03-28Malware Explorer BlogNart Villeneuve
10 Years Since Ghostnet
Gh0stnet
2019-01-01Council on Foreign RelationsCyber Operations Tracker
Operation GhostSecret
Lazarus Group
2018-04-24McAfeeRyan Sherstobitoff
Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide
GhostSecret
2018-04-24McAfeeAsheer Malhotra, Ryan Sherstobitoff
Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide
Lazarus Group
2018-03-22MinervaAsaf Aprozper, Gal Bitensky
GhostMiner: Cryptomining Malware Goes Fileless
GhostMiner
2017-12-04RSAJack Wesley Riley
The Shadows of Ghosts Inside the response of a unique Carbanak intrusion
GOTROJ MimiKatz
2017-07-17Trend MicroCedric Pernet, Jordan Pan, Lenart Bermejo
Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More
GhostCtrl
2017-07-17Secrary BlogLasha Khasaia
WMIGhost / Wimmie - WMI malware
WMI Ghost
2017-03-28CylanceCylance Threat Research Team
Threat Spotlight: GhostAdmin Malware
GhostAdmin
2017-01-17Bleeping ComputerCatalin Cimpanu
New GhostAdmin Malware Used for Data Theft and Exfiltration
GhostAdmin
2016-04-22CylanceIsaac Palmer
The Ghost Dragon
Ghost RAT
2016-04-13FireEyeDaniel Regalado, Erye Hernandez, Taha Karim, Varun Jian
Ghosts in the Endpoint
PLEAD
2009-03-29WikipediaVarious
GhostNet
Gh0stnet GhostNet
2009-03-28Infinitum LabsInformation Warfare Monitor
Tracking GhostNet: Investigating a Cyber Espionage Network
Ghost RAT GhostNet