Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-05-14TelekomThomas Barabosch
LOLSnif – Tracking Another Ursnif-Based Targeted Campaign
LOLSnif
2020-05-14ESET ResearchPeter Kálnai
Mikroceen: Spying backdoor leveraged in high‑profile networks in Central Asia
BYEBY Microcin
2020-05-14BitdefenderBitdefender Team
Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years
Mandrake
2020-05-14Kaspersky LabsGReAT
COMpfun authors spoof visa application with HTTP status-based Trojan
COMpfun
2020-05-14Avast DecodedLuigino Camastra
APT Group Planted Backdoors Targeting High Profile Networks in Central Asia
BYEBY Microcin
2020-05-13KELARaveed Laeb
Access-as-a-Service – Remote Access Markets in the Cybercrime Underground
2020-05-13BitdefenderLiviu Arsene
Global Ransomware and Cyberattacks on Healthcare Spike during Pandemic
2020-05-13Malpedia
Malpedia Family Page for Kiralock (Placeholder)
2020-05-13ESET ResearchIgnacio Sanmillan
Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks
Ramsay Retro
2020-05-12SeqritePavankumar Chaudhari
Java RAT Campaign Targets Co-Operative Banks in India
2020-05-12FireEyeJacob Thompson
Analyzing Dark Crystal RAT, a C# backdoor
DCRat
2020-05-12Trend MicroJoey Chen
Tropic Trooper’s Back: USBferry Attack Targets Air-gapped Environments (Technical Brief)
USBferry
2020-05-12Trend MicroJoey Chen
Tropic Trooper’s Back: USBferry Attack Targets Air-gapped Environments
USBferry
2020-05-12US-CERTUS-CERT
MAR-10288834-1.v1 – North Korean Remote Access Tool: COPPERHEDGE
Bankshot
2020-05-12US-CERTUS-CERT
MAR-10288834-3.v1 – North Korean Trojan: PEBBLEDASH
PEBBLEDASH
2020-05-12US-CERTUS-CERT
MAR-10288834-2.v1 – North Korean Trojan: TAINTEDSCRIBE
TAINTEDSCRIBE
2020-05-11SecurityIntelligenceLimor Kessem, Nir Shwarts
Zeus Sphinx Back in Business: Some Core Modifications Arise
Zeus Sphinx
2020-05-11Palo Alto Networks Unit 42Alex Hinchliffe, Robert Falcone
Updated BackConfig Malware Targeting Government and Military Organizations in South Asia
VICEROY TIGER
2020-05-11Sudeep Singh
Targeted Attacks on Indian Government and Financial Institutions Using the JsOutProx RAT
EpicSplit RAT
2020-05-11Trend MicroGabrielle Joyce Mabutas, Kazuki Fujisawa
New MacOS Dacls RAT Backdoor Shows Lazarus’ Multi-Platform Attack Capability
Dacls