Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-01-01MITREMITRE ATT&CK
Group description: DragonOK
DragonOK
2019-01-01MITREMITRE ATT&CK
Group description: Magic Hound
APT35 Cleaver
2019-01-01Council on Foreign RelationsCyber Operations Tracker
Lazarus Group
Lazarus Group
2019-01-01MITREMITRE ATT&CK
Group description: Naikon
APT30 Naikon
2019-01-01MITREMITRE ATT&CK
Group description: Gorgon Group
The Gorgon Group
2019-01-01MITREMITRE ATT&CK
Group description: Charming Kitten
Charming Kitten
2019-01-01Council on Foreign RelationsCyber Operations Tracker
Magic Hound
APT35 Cleaver
2019-01-01Council on Foreign RelationsCyber Operations Tracker
APT 37
APT37
2019-01-01MITREMITRE ATT&CK
Group description: Group5
Group5
2019-01-01MITREMITRE ATT&CK
Tool description: China Chopper
CHINACHOPPER
2019-01-01CyberIntCyberInt
Legit Remote Admin Tools Turn into Threat Actors' Tools
RMS ServHelper TA505
2019-01-01Virus BulletinMaddie Stone
Unpacking the packed unpacker: reversing an Android anti-analysis native library
Chamois
2018-12-29Los Angeles TimesEmily Alpert Reyes, Meg James, Tony Barboza
Malware attack disrupts delivery of L.A. Times and Tribune papers across the U.S.
Ryuk
2018-12-25Tencent腾讯电脑管家
BITTER/T-APT-17 reports on the latest attacks on sensitive agencies such as military, nuclear, and government agencies in China
Artra Downloader
2018-12-24fumik0 blogfumik0
Let’s dig into Vidar – An Arkei Copycat/Forked Stealer (In-depth analysis)
Arkei Stealer Vidar
2018-12-20CoderctoCodercto
Analysis of the attack activities of Hailian Lotus APT group against large domestic investment companies
CACTUSTORCH
2018-12-20Objective-SeePatrick Wardle
Middle East Cyber-Espionage: analyzing WindShift's implant: OSX.WindTail (part 1)
WindTail
2018-12-20FBIFBI
Chinese Hackers Indicted - Members of APT 10 Group Targeted Intellectual Property and Confidential Business Information
APT10
2018-12-19McAfeeChristiaan Beek, Jessica Saavedra-Morales, Thomas Roccia
Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems
Filerase
2018-12-19Christiaan Beek, Jessica Saavedra-Morales, Thomas Roccia
Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems
OilRig