Click here to download all references as Bib-File.•
2016-08-01
⋅
Malwarebytes
⋅
Shakti Trojan: Technical Analysis Shakti |
2016-07-18
⋅
Malwarebytes
⋅
Third time (un)lucky – improved Petya is out Petya |
2016-07-14
⋅
Malwarebytes
⋅
Untangling Kovter’s persistence methods Kovter |
2016-06-10
⋅
Malwarebytes Labs
⋅
Petya and Mischa: ransomware duet (part 2) Petya |
2016-04-01
⋅
Malwarebytes
⋅
Petya – Taking Ransomware To The Low Level Petya |
2016-03-18
⋅
Malwarebytes
⋅
Teslacrypt Spam Campaign: “Unpaid Issue…” TeslaCrypt |
2015-12-09
⋅
Malwarebytes Labs
⋅
Inside Chimera Ransomware - the first 'doxingware' in wild Chimera |
2015-12-09
⋅
Malwarebytes Labs
⋅
Inside Chimera Ransomware - the first 'doxingware' in wild Chimera |
2015-08-05
⋅
Malwarebytes
⋅
Who’s Behind Your Proxy? Uncovering Bunitu’s Secrets Bunitu |
2015-06-12
⋅
Malwarebytes Labs
⋅
Unusual Exploit Kit Targets Chinese Users (Part 2) Chinad |
2015-05-28
⋅
Malwarebytes Labs
⋅
Unusual Exploit Kit Targets Chinese Users (Part 1) Chinad |