Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-09-24Github (GhostPack)Will Schroeder
Github Repo for Rubeus
Rubeus
2018-04-24McAfeeRyan Sherstobitoff
Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide
GhostSecret
2018-04-24McAfeeAsheer Malhotra, Ryan Sherstobitoff
Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide
Lazarus Group
2018-03-22MinervaAsaf Aprozper, Gal Bitensky
GhostMiner: Cryptomining Malware Goes Fileless
GhostMiner
2017-12-04RSAJack Wesley Riley
The Shadows of Ghosts Inside the response of a unique Carbanak intrusion
GOTROJ MimiKatz
2017-07-17Trend MicroCedric Pernet, Jordan Pan, Lenart Bermejo
Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More
GhostCtrl
2017-07-17Secrary BlogLasha Khasaia
WMIGhost / Wimmie - WMI malware
WMI Ghost
2017-03-28CylanceCylance Threat Research Team
Threat Spotlight: GhostAdmin Malware
GhostAdmin
2017-01-17Bleeping ComputerCatalin Cimpanu
New GhostAdmin Malware Used for Data Theft and Exfiltration
GhostAdmin
2016-04-22CylanceIsaac Palmer
The Ghost Dragon
Ghost RAT
2016-04-13FireEyeDaniel Regalado, Erye Hernandez, Taha Karim, Varun Jian
Ghosts in the Endpoint
PLEAD
2009-03-29WikipediaVarious
GhostNet
Gh0stnet GhostNet
2009-03-28Infinitum LabsInformation Warfare Monitor
Tracking GhostNet: Investigating a Cyber Espionage Network
Ghost RAT GhostNet