Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-07-25ProofpointProofpoint Staff
Parasite HTTP RAT cooks up a stew of stealthy tricks
parasite_http
2018-07-25SymantecNetwork Protection Security Labs, Security Response Attack Investigation Team
Leafminer: New Espionage Campaigns Targeting Middle Eastern Regions
Imecab Sorgu RASPITE
2018-07-24Check PointBen Herzog, Ofer Caspi
Emotet: The Tricky Trojan that ‘Git Clones’
Emotet
2018-07-23CSSCyber Security Strategists
A long-term espionage campaign in Syria
APT-C-27
2018-07-23Bleeping ComputerCatalin Cimpanu
Source Code for Exobot Android Banking Trojan Leaked Online
ExoBot
2018-07-23360 Threat IntelligenceQi Anxin Threat Intelligence Center
Golden Rat Organization-targeted attack in Syria
NjRAT APT-C-27
2018-07-23MalFindLasq
Deobfuscating Emotet’s powershell payload
Emotet
2018-07-20ReutersJack Kim
Cyberattack on Singapore health database steals details of 1.5 million, including PM
Whitefly
2018-07-20NCCICCommunications Integration Center, National Cybersecurity
Alert (TA18-201A) Emotet Malware
Emotet
2018-07-19Bleeping ComputerCatalin Cimpanu
Router Crapfest: Malware Author Builds 18,000-Strong Botnet in a Day
Owari
2018-07-19ProofpointProofpoint Staff
TA505 Abusing SettingContent-ms within PDF files to Distribute FlawedAmmyy RAT
FlawedAmmyy
2018-07-18SymantecSecurity Response Attack Investigation Team
The Evolution of Emotet: From Banking Trojan to Threat Distributor
Emotet
2018-07-17IntrusiontruthIntrusiontruth
Who was behind this unprecedented Cyber attack on Western infrastructure?
2018-07-17Trend MicroJoey Chen
Blackgear Cyberespionage Campaign Resurfaces, Abuses Social Media for C&C Communication
Blackgear
2018-07-17ESET ResearchKaspars Osis
A deep dive down the Vermin RAThole
Quasar RAT Sobaken Vermin
2018-07-13Palo Alto Networks Unit 42Brittany Ash, Mike Harbison
Upatre Continued to Evolve with new Anti-Analysis Techniques
Upatre
2018-07-12360 Threat Intelligence360
Blue Pork Mushroom (APT-C-12) targeted attack technical details revealed
APT-C-12
2018-07-11FireEyeBen Read, Ben Wilson, Dan Perez, Marcin Siedlarz, Scott Henderson, Steve Miller
Chinese Espionage Group TEMP.Periscope Targets Cambodia Ahead of July 2018 Elections and Reveals Broad Operations Globally
AIRBREAK APT40
2018-07-11MicrosoftOffice 365 Threat Research
Hawkeye Keylogger – Reborn v8: An in-depth campaign analysis
HawkEye Keylogger
2018-07-10Carbon BlackJared Myers
Carbon Black TAU Threat Analysis: Recent Dharma Ransomware Highlights Attackers’ Continued Use of Open-Source Tools
Dharma