Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-09-20AvastThreat Intelligence Team
Inside Petya and Mischa ransomware
Petya
2016-09-20SecurityIntelligenceDenis Laskov, Hanan Natan, Limor Kessem
Meanwhile in Britain, Qadars v3 Hardens Evasion, Targets 18 UK Banks
Qadars
2016-09-19Trend MicroNumaan Huq
Untangling the Ripper ATM Malware
Ripper ATM
2016-09-17Laanwj
A few notes on SECONDDATE's C&C protocol
Equationgroup (Sorting)
2016-09-16ZscalerAtinderpal Singh
iSpy Keylogger
iSpy Keylogger
2016-09-14DeloitteDeloitte
The evolution of the Nymaim Criminal Enterprise Threat Intelligence & Analytics
Nymaim
2016-09-13Laanwj
The curious case of BLATSTING's RSA implementation
Equationgroup (Sorting)
2016-09-11Laanwj's BlogWladimir J. van der Laan
BUZZDIRECTION: BLATSTING reloaded
Equationgroup (Sorting)
2016-09-11Softpedia NewsCatalin Cimpanu
Free Darktrack RAT Has the Potential of Being the Best RAT on the Market Search
Darktrack RAT
2016-09-09Kaspersky LabsGReAT
THE PROJECTSAURON APT
ProjectSauron
2016-09-09InfoArmorAndrew Komarov
GOVRAT V2.0 - Attacking US military and government
GovRAT
2016-09-08Bleeping ComputerLawrence Abrams
The Philadelphia Ransomware offers a Mercy Button for Compassionate Criminals
Philadephia Ransom
2016-09-07Virus BulletinBrian Bartholomew, Juan Andrés Guerrero-Saade
Wave Your False Flags! Deception Tactics Muddying Attribution in Targeted Attacks
DuQu JripBot Sinowal Stuxnet Wipbot
2016-09-07Kaspersky LabsStefan Ortloff
The Missing Piece – Sophisticated OS X Backdoor Discovered
Mokes
2016-09-06Laanwj
Blatsting C&C Transcript
Equationgroup (Sorting)
2016-09-06KZ CERTKZ CERT
KZ-CERT has analyzed another sample of malicious software, which is a component of targeted attacks (Targeted attacks, Advanced Persistent Threats (APT))
Icefog
2016-09-04Laanwj's BlogWladimir J. van der Laan
BLATSTING Command-and-Control protocol
Equationgroup (Sorting)
2016-08-30Palo Alto Networks Unit 42Jeff White
Pythons and Unicorns and Hancitor…Oh My! Decoding Binaries Through Emulation
2016-08-30ESET ResearchESET Research
OSX/Keydnap spreads via signed Transmission application
Keydnap
2016-08-29FortinetFloser Bacurio Jr., Joie Salvio
German Speakers Targeted by SPAM Leading to Ozone RAT
Ozone RAT