Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-08-01MalwarebytesMalwarebytes Labs
Shakti Trojan: Technical Analysis
Shakti
2016-07-18MalwarebytesMalwarebytes Labs
Third time (un)lucky – improved Petya is out
Petya
2016-07-14MalwarebytesMalwarebytes Labs
Untangling Kovter’s persistence methods
Kovter
2016-06-10Malwarebytes Labshasherezade
Petya and Mischa: ransomware duet (part 2)
Petya
2016-04-01MalwarebytesMalwarebytes Labs
Petya – Taking Ransomware To The Low Level
Petya
2016-03-18MalwarebytesMalwarebytes Labs
Teslacrypt Spam Campaign: “Unpaid Issue…”
TeslaCrypt
2015-12-09Malwarebytes Labshasherezade, Malwarebytes Labs
Inside Chimera Ransomware - the first 'doxingware' in wild
Chimera
2015-12-09Malwarebytes Labshasherezade, Malwarebytes Labs
Inside Chimera Ransomware - the first 'doxingware' in wild
Chimera
2015-08-05MalwarebytesMalwarebytes Labs
Who’s Behind Your Proxy? Uncovering Bunitu’s Secrets
Bunitu
2015-06-12Malwarebytes LabsJérôme Segura
Unusual Exploit Kit Targets Chinese Users (Part 2)
Chinad
2015-05-28Malwarebytes LabsJérôme Segura
Unusual Exploit Kit Targets Chinese Users (Part 1)
Chinad