Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-12-17BitdefenderBitdefender
APT28 Under the Scope: A Journey into Exfiltrating Intelligence and Government Information
X-Agent XP PrivEsc (CVE-2014-4076)
2015-12-16Facebook (darktrackrat)LuckyDuck
Facebook page advertising DarkTrack RAT
Darktrack RAT
2015-12-11FireEyeDaniel Regalado, Taha Karim
LATENTBOT: Trace Me If You Can
LatentBot
2015-12-08The CitizenlabClaudio Guarnieri, John Scott-Railton, Marion Marschalek, Morgan Marquis-Boire
Packrat: Seven Years of a South American Threat Actor
AdWind Adzok CyberGate Xtreme RAT Packrat
2015-12-07FireEyeDimiter Andonov, Jay Taylor, Nalani Fraser, Will Matson, William Ballenthin
Thriving Beyond The Operating System: Financial Threat Group Targets Volume Boot Record
FIN1
2015-12-07SymantecSecurity Response
Iran-based attackers use back door threats to spy on Middle Eastern targets
CadelSpy Remexi Cadelle
2015-12-07SymantecSymantec Security Response
Iran-based attackers use back door threats to spy on Middle Eastern targets
APT39 Cadelle
2015-12-07SymantecSymantec
Backdoor.Cadelspy and Backdoor.Remexi: indicators of compromise
CadelSpy Remexi
2015-12-04Kaspersky LabsGReAT
Sofacy APT hits high profile targets with updated toolset
Coreshell Sedreco Seduploader X-Agent APT28
2015-12-04Kaspersky LabsGReAT
Sofacy APT hits high profile targets with updated toolset
Sedreco
2015-12-03360 Internet Security CenterYa Liu
Automatically Classifying Unknown Bots by The REGISTER Messages
MrBlack XOR DDoS DarkShell
2015-12-03SymantecSymantec Security Response
Colombians major target of email campaigns delivering Xtreme RAT
Xtreme RAT
2015-12-01Trend MicroErika Mendoza, Jay Yaneza
Operation Black Atlas Endangers In-Store Card Payments and SMBs Worldwide; Switches between BlackPOS and Other Tools
Alina POS BlackPOS Kronos NewPosThings
2015-12-01FireEyeFireEye Threat Intelligence
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets
BUBBLEWRAP LOWBALL TEMPER PANDA
2015-11-300x3A SecurityYonathan Klijnsma
Inside Braviax/FakeRean: An analysis and history of a FakeAV family
2015-11-25RSARSA
Detecting GlassRAT using Security Analytics and ECAT
GlassRAT
2015-11-24FireEyeStephen Ward
ModPOS: Highly-Sophisticated, Stealthy Malware Targeting US POS Systems with High Likelihood of Broader Campaigns
ModPOS
2015-11-23MinervaLabsClearSky, MinervaLabs
CopyKittens Attack Group
CopyKittens
2015-11-19JPCERT/CCYou Nakatsuru
Decrypting Strings in Emdivi
Emdivi
2015-11-11ESET ResearchJean-Ian Boutin
Operation Buhtrap malware distributed via ammyy.com
BuhTrap