Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2012-01-13Middle East OnlineMiddle East Online
@online{online:20120113:cyber:de2ee6e, author = {Middle East Online}, title = {{Cyber war: 'Gaza hackers' deface Israel fire service website}}, date = {2012-01-13}, organization = {Middle East Online}, url = {https://middle-east-online.com/en/cyber-war-gaza-hackers-deface-israel-fire-service-website}, language = {English}, urldate = {2019-10-12} } Cyber war: 'Gaza hackers' deface Israel fire service website
Molerats
2012-01-12Contagio DumpMila Parkour
@online{parkour:20120112:blackhole:c99cf1f, author = {Mila Parkour}, title = {{Blackhole Ramnit - samples and analysis}}, date = {2012-01-12}, organization = {Contagio Dump}, url = {http://contagiodump.blogspot.com/2012/01/blackhole-ramnit-samples-and-analysis.html}, language = {English}, urldate = {2019-12-20} } Blackhole Ramnit - samples and analysis
Ramnit
2012-01-08XyliBoxXylitol
@online{xylitol:20120108:coldeal:2a4bafe, author = {Xylitol}, title = {{Cold$eal: 'Situation is under control'}}, date = {2012-01-08}, organization = {XyliBox}, url = {https://www.xylibox.com/2012/01/coldeal-situation-is-under-control.html}, language = {English}, urldate = {2020-11-26} } Cold$eal: 'Situation is under control'
Cold$eal
2012-01-06Exploit-DBRick Flores
@techreport{flores:20120106:official:5984bcc, author = {Rick Flores}, title = {{Official Malware Report: Malware Reverse Engineering}}, date = {2012-01-06}, institution = {Exploit-DB}, url = {https://www.exploit-db.com/docs/english/18387-malware-reverse-engineering-part-1---static-analysis.pdf}, language = {English}, urldate = {2020-01-09} } Official Malware Report: Malware Reverse Engineering
FakeRean
2012-01-06XyliBoxXylitol
@online{xylitol:20120106:cracking:8add3f8, author = {Xylitol}, title = {{Cracking Cold$eal 5.4.1 FWB++}}, date = {2012-01-06}, organization = {XyliBox}, url = {https://www.xylibox.com/2012/01/cracking-coldeal-541-fwb.html}, language = {English}, urldate = {2020-11-26} } Cracking Cold$eal 5.4.1 FWB++
Cold$eal
2012-01-04PCWorldJeremy Kirk
@online{kirk:20120104:spyeye:3ecb013, author = {Jeremy Kirk}, title = {{SpyEye Malware Borrows Zeus Trick to Mask Fraud}}, date = {2012-01-04}, organization = {PCWorld}, url = {https://www.pcworld.com/article/247252/spyeye_malware_borrows_zeus_trick_to_mask_fraud.html}, language = {English}, urldate = {2020-01-08} } SpyEye Malware Borrows Zeus Trick to Mask Fraud
SpyEye
2012CSIS Trend MicroPeter Kruse (CSIS), Feike Hacquebord (Trend Micro), Robert McArdle (Trend Micro)
@techreport{csis:2012:w32tinba:542635f, author = {Peter Kruse (CSIS) and Feike Hacquebord (Trend Micro) and Robert McArdle (Trend Micro)}, title = {{W32.Tinba (Tinybanker) The Turkish Incident}}, date = {2012}, institution = {CSIS Trend Micro}, url = {http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_w32-tinba-tinybanker.pdf}, language = {English}, urldate = {2019-12-24} } W32.Tinba (Tinybanker) The Turkish Incident
Tinba
2012Norman ASASnorre Fagerland
@techreport{fagerland:2012:many:c938856, author = {Snorre Fagerland}, title = {{The many faces of Gh0st Rat}}, date = {2012}, institution = {Norman ASA}, url = {http://download01.norman.no/documents/ThemanyfacesofGh0stRat.pdf}, language = {English}, urldate = {2019-12-20} } The many faces of Gh0st Rat
Ghost RAT
2012Trend MicroForward-Looking Threat Research Team
@techreport{team:2012:inside:f112987, author = {Forward-Looking Threat Research Team}, title = {{Inside an APT Campaign with Multiple Targets in India and Japan}}, date = {2012}, institution = {Trend Micro}, url = {https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp_luckycat_redux.pdf}, language = {English}, urldate = {2020-01-08} } Inside an APT Campaign with Multiple Targets in India and Japan
Lucky Cat
2012SymantecVarious
@techreport{various:2012:luckycat:4901720, author = {Various}, title = {{The Luckycat Hackers}}, date = {2012}, institution = {Symantec}, url = {https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the_luckycat_hackers.pdf}, language = {English}, urldate = {2020-01-08} } The Luckycat Hackers
Lucky Cat
2012SymantecNicolas Falliere
@techreport{falliere:2012:w32qakbot:974b5b5, author = {Nicolas Falliere}, title = {{W32.Qakbot in Detail}}, date = {2012}, institution = {Symantec}, url = {http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_qakbot_in_detail.pdf}, language = {English}, urldate = {2019-11-28} } W32.Qakbot in Detail
QakBot
2012Cobalt StrikeCobalt Strike
@online{strike:2012:cobalt:8522cdd, author = {Cobalt Strike}, title = {{Cobalt Strike Website}}, date = {2012}, organization = {Cobalt Strike}, url = {https://www.cobaltstrike.com/support}, language = {English}, urldate = {2020-01-13} } Cobalt Strike Website
Cobalt Strike
2011-12-08SymantecVikram Thakur
@online{thakur:20111208:sykipot:cf66ef3, author = {Vikram Thakur}, title = {{The Sykipot Attacks}}, date = {2011-12-08}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/sykipot-attacks}, language = {English}, urldate = {2019-10-15} } The Sykipot Attacks
sykipot
2011-11-23SymantecSymantec
@techreport{symantec:20111123:w32duqu:05cefba, author = {Symantec}, title = {{W32.Duqu: The precursor to the next Stuxnet}}, date = {2011-11-23}, institution = {Symantec}, url = {http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_duqu_the_precursor_to_the_next_stuxnet_research.pdf}, language = {English}, urldate = {2020-01-08} } W32.Duqu: The precursor to the next Stuxnet
DuQu
2011-10-31Trend MicroNart Villeneuve
@online{villeneuve:20111031:significance:4039c39, author = {Nart Villeneuve}, title = {{The Significance of the "Nitro" Attacks}}, date = {2011-10-31}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/the-significance-of-the-nitro-attacks/}, language = {English}, urldate = {2020-01-08} } The Significance of the "Nitro" Attacks
Nitro
2011-10-26IntegoPeter James
@online{james:20111026:tsunami:7815511, author = {Peter James}, title = {{Tsunami Backdoor Can Be Used for Denial of Service Attacks}}, date = {2011-10-26}, organization = {Intego}, url = {https://www.intego.com/mac-security-blog/tsunami-backdoor-can-be-used-for-denial-of-service-attacks}, language = {English}, urldate = {2019-10-25} } Tsunami Backdoor Can Be Used for Denial of Service Attacks
Tsunami
2011-10-13Frankie Fu Kay Li
@online{li:20111013:detailed:650b25e, author = {Frankie Fu Kay Li}, title = {{A Detailed Analysis of an Advanced Persistent Threat Malware}}, date = {2011-10-13}, url = {https://www.sans.org/reading-room/whitepapers/malicious/detailed-analysis-advanced-persistent-threat-malware-33814}, language = {English}, urldate = {2019-10-14} } A Detailed Analysis of an Advanced Persistent Threat Malware
woody
2011-10-08F-SecureMikko
@online{mikko:20111008:possible:a0424c6, author = {Mikko}, title = {{Possible Governmental Backdoor Found ("Case R2D2")}}, date = {2011-10-08}, organization = {F-Secure}, url = {https://www.f-secure.com/weblog/archives/00002249.html}, language = {English}, urldate = {2020-01-05} } Possible Governmental Backdoor Found ("Case R2D2")
Bundestrojaner
2011-10-08CCCCCC
@techreport{ccc:20111008:analyse:0c4a8c9, author = {CCC}, title = {{ANALYSE EINER REGIERUNGS-MALWARE}}, date = {2011-10-08}, institution = {CCC}, url = {http://www.ccc.de/system/uploads/76/original/staatstrojaner-report23.pdf}, language = {English}, urldate = {2020-01-07} } ANALYSE EINER REGIERUNGS-MALWARE
Bundestrojaner
2011-10-07Contagiodump BlogMila Parkour
@online{parkour:20111007:rustock:d35b63c, author = {Mila Parkour}, title = {{Rustock samples and analysis links. Rustock.C, E, I, J and other variants}}, date = {2011-10-07}, organization = {Contagiodump Blog}, url = {http://contagiodump.blogspot.com/2011/10/rustock-samples-and-analysis-links.html}, language = {English}, urldate = {2019-12-20} } Rustock samples and analysis links. Rustock.C, E, I, J and other variants
Rustock