Click here to download all references as Bib-File.
2017-09-27 ⋅ Proofpoint ⋅ Threat Actor Profile: TA505, From Dridex to GlobeImposter TA505 |
2017-08-01 ⋅ Panda Security ⋅ Malware Report: Dridex Version 4 Dridex |
2017-07-25 ⋅ Github (viql) ⋅ Dridex Loot Dridex |
2017-05-25 ⋅ Kaspersky Labs ⋅ Dridex: A History of Evolution Feodo |
2017-05-11 ⋅ Proofpoint ⋅ Jaff - New Ransomware From the Actors Behind the Distribution of Dridex, Locky, and Bart Jaff |
2017-02-28 ⋅ Security Intelligence ⋅ Dridex’s Cold War: Enter AtomBombing Dridex |
2017-01-26 ⋅ Flashpoint ⋅ Dridex Banking Trojan Returns, Leverages New UAC Bypass Method Dridex |
2016-02-16 ⋅ Symantec ⋅ Dridex: Tidal waves of spam pushing dangerous financial Trojan Dridex |
2016-01-29 ⋅ Zscaler ⋅ Malicious Office Files Dropping Kasidet And Dridex Neutrino |
2015-11-10 ⋅ CERT.PL ⋅ Talking to Dridex (part 0) – inside the dropper Dridex |
2015-10-26 ⋅ Blueliv ⋅ Chasing cybercrime: network insights of Dyre and Dridex Trojan bankers Dridex Dyre |
2015-10-15 ⋅ BitSight ⋅ Dridex: Chasing a botnet from the inside Dridex |
2015-10-13 ⋅ Secureworks ⋅ Dridex (Bugat v5) Botnet Takeover Operation Dridex Evil Corp |
2014-03-06 ⋅ Threatpost ⋅ Dexter, Project Hook POS Malware Campaigns Persist Project Hook POS |
2012-12-23 ⋅ Contagio Dump ⋅ Dec 2012 Dexter - POS Infostealer samples and information Dexter |
2012-12-21 ⋅ Trend Micro ⋅ Infostealer Dexter Targets Checkout Systems Dexter |
2012-12-13 ⋅ SpiderLabs Blog ⋅ The Dexter Malware: Getting Your Hands Dirty |
2012-12-12 ⋅ Volatility Labs ⋅ Unpacking Dexter POS "Memory Dump Parsing" Malware Dexter |
2012-08-03 ⋅ Contagio Dump ⋅ Cridex Analysis using Volatility Feodo |
2012-08-02 ⋅ Cridex Analysis using Volatility Feodo |