Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-08-29FireEyeKyle Wilhoit, Thoufique Haq
Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks
Blackworm RAT
2014-05-30MalwarebytesAdam Kujawa
Taking off the Blackshades
BlackShades
2013-07-19BlackHatJason Geffner
End-to-End Analysis of a Domain Generating Algorithm Malware Family
SuppoBox
2013-04-26ESET ResearchPierre-Marc Bureau
Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole
CDorked
2013-02-08VMWare Carbon BlackPatrick Morley
Bit9 and Our Customers’ Security
APT17
2012-10-02SonicWallThoufique Haq
Blackhole Exploit Kit – Rise and Evolution
2012-06-21Contagio DumpMila Parkour
RAT samples from Syrian Targeted attacks - Blackshades RAT, XTreme RAT, Dark Comet RAT used by Syrian Electronic Army
BlackShades DarkComet Terminator RAT
2012-06-21MalwarebytesAdam Kujawa
BlackShades in Syria
BlackShades
2012-06-15MalwarebytesAdam Kujawa
You Dirty RAT! Part 2 – BlackShades NET
BlackShades
2012-04-18Contagiodump BlogMila Parkour
DarkMegi rootkit - sample (distributed via Blackhole)
DarkMegi
2012-03-02ESET ResearchAleksandr Matrosov, David Harley, Dmitry Volkov, Eugene Rodionov
Win32/Carberp: When You're in a Black Hole, Stop Digging
Carberp
2012-01-12Contagio DumpMila Parkour
Blackhole Ramnit - samples and analysis
Ramnit
2010-07-15Kaspersky LabsDmitry Tarakanov
Black DDoS
BlackEnergy
2010-03-03FireEyeJulia Wolf
Black Energy Crypto
BlackEnergy
2010-03-03SecureworksJoe Stewart
BlackEnergy Version 2 Threat Analysis
BlackEnergy
2009-10-25Malpedia
Malpedia IcyHeart Page (Placeholder)
IcyHeart
2007-10-01Arbor NetworksJose Nazario
BlackEnergy DDoS Bot Analysis
BlackEnergy