Click here to download all references as Bib-File.•
2013-10-04
⋅
Symantec
⋅
ZeroAccess Indepth ZeroAccess |
2013-09-24
⋅
How to extract BetaBot config info BetaBot |
2013-09-21
⋅
FireEye
⋅
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog APT17 |
2013-09-21
⋅
FireEye
⋅
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog |
2013-09-18
⋅
Zscaler
⋅
A New Wave Of WIN32/CAPHAW Attacks - A ThreatLabZ Analysis Shylock |
2013-09-17
⋅
Symantec
⋅
Hidden Lynx – Professional Hackers for Hire 9002 RAT HiKit APT17 |
2013-09-17
⋅
Symantec
⋅
Hidden Lynx – Professional Hackers for Hire APT17 |
2013-09-17
⋅
Symantec
⋅
Hidden Lynx – Professional Hackers for Hire |
2013-09-17
⋅
Symantec
⋅
Hidden Lynx – Professional Hackers for Hire |
2013-09-06
⋅
FireEye
⋅
Evasive Tactics: Taidoor taidoor Taleret |
2013-08-23
⋅
FireEye
⋅
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy Poison Ivy Molerats |
2013-08-12
⋅
FireEye
⋅
Survival of the Fittest: New York Times Attackers Evolve Quickly yayih |
2013-08-07
⋅
RSA
⋅
Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux #INTH3WILD Hand of Thief |
2013-08-01
⋅
Malwarebytes
⋅
Sophos Discovers ZeroAccess Using RLO ZeroAccess |
2013-07-25
⋅
Malwarebytes
⋅
ZeroAccess uses Self-Debugging ZeroAccess |
2013-07-22
⋅
Avast
⋅
Multisystem Trojan Janicab attacks Windows and MacOSX via scripts Janicab |
2013-07-19
⋅
BlackHat
⋅
End-to-End Analysis of a Domain Generating Algorithm Malware Family SuppoBox |
2013-07-15
⋅
F-Secure
⋅
Signed Mac Malware Using Right-to-Left Override Trick Janicab |
2013-06-26
⋅
Symantec
⋅
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War Lazarus Group |
2013-06-26
⋅
Symantec
⋅
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War Lazarus Group |