Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2013-12-12FireEye IncJames T. Bennett, Kenneth Geers, Mike Scott, Nart Villeneuve, Ned Moran, Thoufique Haq
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs
Tidepool APT15
2013-11-05F-SecureSnorre Fagerland
Operation Hangover: Unveiling an Indian Cyberattack Infrastructure
VICEROY TIGER
2013-11-02The MalwareMustDie Blogmalwaremustdie
RunForrestRun DGA "Comeback" with new obfuscation
RunForestRun
2013-10-31FireEyeNed Moran, Thoufique Haq
Know Your Enemy: Tracking A Rapidly Evolving APT Actor
Bozok Poison Ivy TEMPER PANDA
2013-10-10CrowdStrikeMatt Dahl
Regional Conflict and Cyber Blowback
Corsair Jackal
2013-10-04SymantecAlan Neville, Ross Gibb
ZeroAccess Indepth
ZeroAccess
2013-09-24Hanan Natan
How to extract BetaBot config info
BetaBot
2013-09-21FireEyeNart Villeneuve, Ned Moran
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets
DeputyDog APT17
2013-09-21FireEyeNart Villeneuve, Ned Moran
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets
DeputyDog
2013-09-18ZscalerChris Mannon, Sachin Deodhar
A New Wave Of WIN32/CAPHAW Attacks - A ThreatLabZ Analysis
Shylock
2013-09-17SymantecBranko Spasojevic, Jonell Baltazar, Jozsef Gegeny, Stephen Doherty
Hidden Lynx – Professional Hackers for Hire
9002 RAT HiKit APT17
2013-09-17SymantecSymantec Security Response
Hidden Lynx – Professional Hackers for Hire
APT17
2013-09-17SymantecSecurity Response
Hidden Lynx – Professional Hackers for Hire
2013-09-17SymantecBranko Spasojevic, Jonell Baltazar, Jozsef Gegeny, Stephen Doherty
Hidden Lynx – Professional Hackers for Hire
2013-09-06FireEyeNart Villeneuve, Ned Moran, Thoufique Haq
Evasive Tactics: Taidoor
taidoor Taleret
2013-08-23FireEyeNart Villeneuve, Ned Moran, Thoufique Haq
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy
Poison Ivy Molerats
2013-08-12FireEyeNart Villeneuve, Ned Moran
Survival of the Fittest: New York Times Attackers Evolve Quickly
yayih
2013-08-07RSALimor Kessem
Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux #INTH3WILD
Hand of Thief
2013-08-01MalwarebytesJoshua Cannell
Sophos Discovers ZeroAccess Using RLO
ZeroAccess
2013-07-25MalwarebytesJoshua Cannell
ZeroAccess uses Self-Debugging
ZeroAccess