Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-02-24ThreatpostMichael Mimoso
Operation Blockbuster Coalition Ties Destructive Attacks to Lazarus Group
Lazarus Group
2016-02-22SymantecA L Johnson
Russian bank employees received fake job offers in targeted email attack
Buhtrap BuhTrap
2016-02-22SymantecSymantec Security Response
Russian bank employees received fake job offers in targeted email attack
Buhtrap BuhTrap
2016-02-18Palo Alto Networks Unit 42Claud Xiao, Cong Zheng, Zhi Xu
New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom
Xbot
2016-02-17HackDig
Russian Police Prevented Massive Banking Sector Cyber Attack
Mana Team
2016-02-12Palo Alto Networks Unit 42Bryan Lee, Rob Downs
A Look Into Fysbis: Sofacy’s Linux Backdoor
X-Agent
2016-02-12Palo Alto Networks Unit 42Bryan Lee, Rob Downs
A Look Into Fysbis: Sofacy’s Linux Backdoor
X-Agent
2016-02-09DARKReadingKelly Jackson Higgins
Chinese Cyberspies Pivot To Russia In Wake Of Obama-Xi Pact
APT21
2016-02-09Malwarebyteshasherezade
DMA Locker Strikes Back
DMA Locker
2016-02-09Kaspersky LabsGReAT
Poseidon Group: a Targeted Attack Boutique specializing in global cyber-espionage
Poseidon Group
2016-02-08Kaspersky LabsComputer Incidents Investigation Department, GReAT
APT-style bank robberies increase with Metel, GCMAN and Carbanak 2.0 attacks
gcman GCMAN
2016-02-01BluelivRaashid Bhat
Tracking the footprints of PushDo Trojan
Pushdo
2016-01-29Virus BulletinAndrei Nacu, Mihail Androinic, Vlad Craciun
VB2015 paper: It's A File Infector... It’s Ransomware... It's Virlock
VirLock
2016-01-29Kaspersky LabsStefan Ortloff
From Linux to Windows – New Family of Cross-Platform Desktop Backdoors Discovered
Mokes Mokes
2016-01-28Kaspersky LabsGReAT
BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents
BlackEnergy
2016-01-25Bleeping ComputerLawrence Abrams
Hidden Tear Ransomware Developer Blackmailed by Malware Developers using his Code
EDA2 HiddenTear
2016-01-24Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone
Scarlet Mimic: Years-Long Espionage Campaign Targets Minority Activists
CrypticConvo Scarlet Mimic
2016-01-22FortiGuard LabsRuchna Nigam
CVE-2015-4400 : Backdoorbot, Network Configuration Leak on a Connected Doorbell
2016-01-22SANSNell Nelson
The Impact of Dragonfly Malware on Industrial Control Systems
ENERGETIC BEAR
2016-01-22Palo Alto Networks Unit 42Bryan Lee, Josh Grunzweig
New Attacks Linked to C0d0so0 Group
APT19