Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-11-20McAfeeInhee Han
@online{han:20171120:android:c3f825c, author = {Inhee Han}, title = {{Android Malware Appears Linked to Lazarus Cybercrime Group}}, date = {2017-11-20}, organization = {McAfee}, url = {https://securingtomorrow.mcafee.com/mcafee-labs/android-malware-appears-linked-to-lazarus-cybercrime-group/#sf174581990}, language = {English}, urldate = {2019-12-17} } Android Malware Appears Linked to Lazarus Cybercrime Group
HARDRAIN
2017-10-31McAfeeXiaobing Lin
@online{lin:20171031:expiro:3270051, author = {Xiaobing Lin}, title = {{Expiro Malware Is Back and Even Harder to Remove}}, date = {2017-10-31}, organization = {McAfee}, url = {https://www.mcafee.com/blogs/other-blogs/mcafee-labs/expiro-infects-encrypts-files-to-complicate-repair/}, language = {English}, urldate = {2022-02-16} } Expiro Malware Is Back and Even Harder to Remove
Expiro
2017-07-04McAfeeMcAfee
@online{mcafee:20170704:important:78128be, author = {McAfee}, title = {{Important information about Night Dragon}}, date = {2017-07-04}, organization = {McAfee}, url = {https://kc.mcafee.com/corporate/index?page=content&id=KB71150}, language = {English}, urldate = {2020-01-06} } Important information about Night Dragon
Night Dragon
2017-06McAfeeMcAfee
@techreport{mcafee:201706:mcafee:9fb6783, author = {McAfee}, title = {{McAfee Labs Threats Report}}, date = {2017-06}, institution = {McAfee}, url = {https://www.mcafee.com/us/resources/reports/rp-quarterly-threats-jun-2017.pdf}, language = {English}, urldate = {2020-01-06} } McAfee Labs Threats Report
Pony
2016-07-21McAfeeOliver Devane, Mohinder Gill
@online{devane:20160721:phishing:314ff25, author = {Oliver Devane and Mohinder Gill}, title = {{Phishing Attacks Employ Old but Effective Password Stealer}}, date = {2016-07-21}, organization = {McAfee}, url = {https://securingtomorrow.mcafee.com/mcafee-labs/phishing-attacks-employ-old-effective-password-stealer/}, language = {English}, urldate = {2019-12-17} } Phishing Attacks Employ Old but Effective Password Stealer
ISR Stealer
2014-07-15McAfeeMcAfee
@online{mcafee:20140715:targeted:06d811a, author = {McAfee}, title = {{Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities}}, date = {2014-07-15}, organization = {McAfee}, url = {https://securingtomorrow.mcafee.com/mcafee-labs/targeted-attacks-on-french-company-exploit-multiple-word-vulnerabilities/}, language = {English}, urldate = {2019-11-22} } Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
PittyTiger RAT
2014-07-15McAfeeMcAfee
@online{mcafee:20140715:targeted:dc6a405, author = {McAfee}, title = {{Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities}}, date = {2014-07-15}, organization = {McAfee}, url = {https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/targeted-attacks-on-french-company-exploit-multiple-word-vulnerabilities/}, language = {English}, urldate = {2019-12-24} } Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
Pitty Panda
2014-02-15McAfeeMcAfee
@online{mcafee:20140215:examining:520652d, author = {McAfee}, title = {{Examining Your Very Own Sefnit Trojan}}, date = {2014-02-15}, organization = {McAfee}, url = {https://www.mcafee.com/blogs/other-blogs/mcafee-labs/sefnit-trojan-just/}, language = {English}, urldate = {2021-09-19} } Examining Your Very Own Sefnit Trojan
Mevade
2013-03-21McAfeeMcAfee
@online{mcafee:20130321:vskimmer:c441afa, author = {McAfee}, title = {{VSkimmer Botnet Targets Credit Card Payment Terminals}}, date = {2013-03-21}, organization = {McAfee}, url = {https://securingtomorrow.mcafee.com/mcafee-labs/vskimmer-botnet-targets-credit-card-payment-terminals/}, language = {English}, urldate = {2019-10-15} } VSkimmer Botnet Targets Credit Card Payment Terminals
vSkimmer
2013McAfeeRyan Sherstobitoff, Itai Liba, James Walter
@techreport{sherstobitoff:2013:dissecting:74f9183, author = {Ryan Sherstobitoff and Itai Liba and James Walter}, title = {{Dissecting Operation Troy: Cyberespionage in South Korea}}, date = {2013}, institution = {McAfee}, url = {https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2013/dissecting-operation-troy.pdf}, language = {English}, urldate = {2020-01-08} } Dissecting Operation Troy: Cyberespionage in South Korea
httpdropper
2012-04-05McAfeeMcAfee
@online{mcafee:20120405:darkshell:d8a6514, author = {McAfee}, title = {{Darkshell DDOS Botnet Evolves With Variants}}, date = {2012-04-05}, organization = {McAfee}, url = {https://www.mcafee.com/blogs/other-blogs/mcafee-labs/darkshell-ddos-botnet-evolves-with-variants/}, language = {English}, urldate = {2021-04-14} } Darkshell DDOS Botnet Evolves With Variants
DarkShell
2011-02-10McAfeeMcAfee Foundstone Professional Services, McAfee Labs
@techreport{services:20110210:global:c04a33d, author = {McAfee Foundstone Professional Services and McAfee Labs}, title = {{Global Energy Cyberattacks: “Night Dragon”}}, date = {2011-02-10}, institution = {McAfee}, url = {https://securingtomorrow.mcafee.com/wp-content/uploads/2011/02/McAfee_NightDragon_wp_draft_to_customersv1-1.pdf}, language = {English}, urldate = {2019-12-19} } Global Energy Cyberattacks: “Night Dragon”
Night Dragon