Click here to download all references as Bib-File.•
2018-02-05
⋅
Analyzing OSX/CreativeUpdater a macOS cryptominer, distributed via macupdate.com CreativeUpdater |
2018-02-04
⋅
Check Point
⋅
DorkBot: An Investigation NgrBot |
2018-02-03
⋅
FireEye
⋅
Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations TEMP.Hermit |
2018-02-02
⋅
McAfee
⋅
Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems Running RAT |
2018-02-02
⋅
Malwarebytes
⋅
New Mac cryptominer distributed via a MacUpdate hack CreativeUpdater |
2018-02-01
⋅
Bitdefender
⋅
Operation PZCHAO Inside a highly specialized espionage infrastructure Ghost RAT APT27 |
2018-02-01
⋅
Bitdefender
⋅
Operation PZChao: a possible return of the Iron Tiger APT APT27 |
2018-01-31
⋅
Sophos Naked Security
⋅
What are “WannaMine” attacks, and how do I avoid them? WannaMine |
2018-01-31
⋅
Proofpoint
⋅
Smominru Monero mining botnet making millions for operators MyKings Spreader Smominru |
2018-01-30
⋅
Malwarebytes
⋅
GandCrab ransomware distributed by RIG and GrandSoft exploit kits (updated) Gandcrab |
2018-01-29
⋅
Palo Alto Networks Unit 42
⋅
VERMIN: Quasar RAT and Custom Malware Used In Ukraine Vermin |
2018-01-27
⋅
Accenture Security
⋅
LATEST CYBER ESPIONAGE MALWARE ATTACKS - DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES Elise |
2018-01-26
⋅
Palo Alto Networks Unit 42
⋅
The TopHat Campaign: Attacks Within The Middle East Region Using Popular Third-Party Services Scote |
2018-01-26
⋅
Bleeping Computer
⋅
The Velso Ransomware Being Manually Installed by Attackers Velso |
2018-01-25
⋅
CrowdStrike
⋅
WannaMine Cryptomining: Harmless Nuisance or Disruptive Threat? WannaMine |
2018-01-24
⋅
ESET Research
⋅
ESET’S GUIDE TODEOBFUSCATING AND DEVIRTUALIZING FINFISHER FinFisher RAT |
2018-01-24
⋅
Trend Micro
⋅
Lazarus Campaign Targeting Cryptocurrencies Reveals Remote Controller Tool, an Evolved RATANKBA, and More PowerRatankba |
2018-01-24
⋅
Bitdefender
⋅
New Hide ‘N Seek IoT Botnet using custom-built Peer-to-Peer communication spotted in the wild Hide and Seek |
2018-01-24
⋅
Bleeping Computer
⋅
New HNS IoT Botnet Has Already Amassed 14K Bots Hide and Seek |
2018-01-24
⋅
Trend Micro
⋅
A Look into the Lazarus Group’s Operations Lazarus Group |