Click here to download all references as Bib-File.•
2014-04-09
⋅
Dr.Web
⋅
BackDoor.Gootkit.112—a new multi-purpose backdoor GootKit |
2014-03-25
⋅
FireEye
⋅
Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370 APT30 Naikon |
2014-03-13
⋅
Threatpost
⋅
Energy Watering Hole Attack Used LightsOut Exploit Kit ENERGETIC BEAR |
2014-03-12
⋅
Blog (Artem Baranov)
⋅
Uroburos: the snake rootkit Uroburos |
2014-03-06
⋅
Trend Micro
⋅
The Siesta Campaign: A New Targeted Attack Awakens APT1 |
2014-03-01
⋅
Vinsula
⋅
ChewBacca – A TOR Based POS Malware ChewBacca |
2014-02-03
⋅
Virus Bulletin
⋅
Needle in a haystack Evasive Panda |
2014-02-02
⋅
Department of Justice
⋅
U.S. Leads Multi-National Action Against “Gameover Zeus” Botnet and “Cryptolocker” Ransomware, Charges Botnet Administrator CryptoLocker |
2014-01-21
⋅
Sophos Naked Security
⋅
Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack Laoshu |
2014-01-14
⋅
Kaspersky Labs
⋅
The Icefog APT Hits US Targets With Java Backdoor DAGGER PANDA |
2014-01-01
⋅
Council on Foreign Relations
⋅
Operation Cleaver Cleaver |
2014-01-01
⋅
Airbus Defence & Space
⋅
The Eye of the Tiger paladin PittyTiger RAT |
2014-01-01
⋅
Trend Micro
⋅
Targeted Attack Trends in Asia-Pacific Elise |
2013-12-12
⋅
FireEye Inc
⋅
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs Tidepool APT15 |
2013-11-05
⋅
F-Secure
⋅
Operation Hangover: Unveiling an Indian Cyberattack Infrastructure VICEROY TIGER |
2013-10-31
⋅
FireEye
⋅
Know Your Enemy: Tracking A Rapidly Evolving APT Actor Bozok Poison Ivy TEMPER PANDA |
2013-10-10
⋅
CrowdStrike
⋅
Regional Conflict and Cyber Blowback Corsair Jackal |
2013-09-24
⋅
How to extract BetaBot config info BetaBot |
2013-09-21
⋅
FireEye
⋅
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog APT17 |
2013-09-21
⋅
FireEye
⋅
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog |