Click here to download all references as Bib-File.•
2017-03-10
⋅
Malwarebytes
⋅
Explained: Spora ransomware Spora |
2017-02-27
⋅
Malwarebytes
⋅
New Neutrino Bot comes in a protective loader Neutrino |
2017-01-31
⋅
Malwarebytes
⋅
Locky Bart ransomware and backend server analysis Locky |
2017-01-26
⋅
Malwarebytes
⋅
Zbot with legitimate applications on board Zloader |
2016-12-15
⋅
Malwarebytes
⋅
Goldeneye Ransomware – the Petya/Mischa combo rebranded |
2016-11-21
⋅
Malwarebytes
⋅
PrincessLocker – ransomware with not so royal encryption PrincessLocker |
2016-11-10
⋅
Malwarebytes
⋅
Floki Bot and the stealthy dropper FlokiBot |
2016-10-24
⋅
Malwarebytes
⋅
Introducing TrickBot, Dyreza’s successor TrickBot |
2016-08-25
⋅
Malwarebytes
⋅
Unpacking the spyware disguised as antivirus PlugX |
2016-08-15
⋅
Malwarebytes
⋅
Shakti Trojan: Document Thief Shakti |
2016-08-05
⋅
Malwarebytes
⋅
Smoke Loader – downloader with a smokescreen still alive SmokeLoader |
2016-08-01
⋅
Malwarebytes
⋅
Shakti Trojan: Technical Analysis Shakti |
2016-07-18
⋅
Malwarebytes
⋅
Third time (un)lucky – improved Petya is out Petya |
2016-07-14
⋅
Malwarebytes
⋅
Untangling Kovter’s persistence methods Kovter |
2016-06-10
⋅
Malwarebytes Labs
⋅
Petya and Mischa: ransomware duet (part 2) Petya |
2016-04-01
⋅
Malwarebytes
⋅
Petya – Taking Ransomware To The Low Level Petya |
2016-03-18
⋅
Malwarebytes
⋅
Teslacrypt Spam Campaign: “Unpaid Issue…” TeslaCrypt |
2015-12-09
⋅
Malwarebytes Labs
⋅
Inside Chimera Ransomware - the first 'doxingware' in wild Chimera |
2015-08-05
⋅
Malwarebytes
⋅
Who’s Behind Your Proxy? Uncovering Bunitu’s Secrets Bunitu |
2015-06-12
⋅
Malwarebytes Labs
⋅
Unusual Exploit Kit Targets Chinese Users (Part 2) Chinad |
2015-05-28
⋅
Malwarebytes Labs
⋅
Unusual Exploit Kit Targets Chinese Users (Part 1) Chinad |