Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-02-05Patrick Wardle
Analyzing OSX/CreativeUpdater a macOS cryptominer, distributed via macupdate.com
CreativeUpdater
2018-02-04Check PointMark Lechtik
DorkBot: An Investigation
NgrBot
2018-02-03FireEyeFireEye
Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations
TEMP.Hermit
2018-02-02McAfeeRyan Sherstobitoff
Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems
Running RAT
2018-02-02MalwarebytesThomas Reed
New Mac cryptominer distributed via a MacUpdate hack
CreativeUpdater
2018-02-01BitdefenderBitdefender Team
Operation PZCHAO Inside a highly specialized espionage infrastructure
Ghost RAT APT27
2018-02-01BitdefenderBogdan Botezatu, Ivona Alexandra Chili
Operation PZChao: a possible return of the Iron Tiger APT
APT27
2018-01-31Sophos Naked SecurityPaul Ducklin
What are “WannaMine” attacks, and how do I avoid them?
WannaMine
2018-01-31ProofpointKafeine
Smominru Monero mining botnet making millions for operators
MyKings Spreader Smominru
2018-01-30MalwarebytesMalwarebytes Labs
GandCrab ransomware distributed by RIG and GrandSoft exploit kits (updated)
Gandcrab
2018-01-29Palo Alto Networks Unit 42Juan Cortes, Tom Lancaster
VERMIN: Quasar RAT and Custom Malware Used In Ukraine
Vermin
2018-01-27Accenture SecurityAccenture Security, Bart Parys
LATEST CYBER ESPIONAGE MALWARE ATTACKS - DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES
Elise
2018-01-26Palo Alto Networks Unit 42Josh Grunzweig
The TopHat Campaign: Attacks Within The Middle East Region Using Popular Third-Party Services
Scote
2018-01-26Bleeping ComputerLawrence Abrams
The Velso Ransomware Being Manually Installed by Attackers
Velso
2018-01-25CrowdStrikeIan Barton, Jason Barnes, Karan Sood, Ryan McCombs
WannaMine Cryptomining: Harmless Nuisance or Disruptive Threat?
WannaMine
2018-01-24ESET ResearchFilip Kafka
ESET’S GUIDE TODEOBFUSCATING AND DEVIRTUALIZING FINFISHER
FinFisher RAT
2018-01-24Trend MicroCH Lei, Fyodor Yarochkin, Lenart Bermejo, Philippe Z Lin, Razor Huang
Lazarus Campaign Targeting Cryptocurrencies Reveals Remote Controller Tool, an Evolved RATANKBA, and More
PowerRatankba
2018-01-24BitdefenderBogdan Botezatu
New Hide ‘N Seek IoT Botnet using custom-built Peer-to-Peer communication spotted in the wild
Hide and Seek
2018-01-24Bleeping ComputerCatalin Cimpanu
New HNS IoT Botnet Has Already Amassed 14K Bots
Hide and Seek
2018-01-24Trend MicroTrendmicro
A Look into the Lazarus Group’s Operations
Lazarus Group