Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-02-08ForcepointLuke Somerville, Robert Neumann
UDPoS - exfiltrating credit card data via DNS
UDPoS
2018-02-07Palo Alto Networks Unit 42Brad Duncan, Vicky Ray
Compromised Servers & Fraud Accounts: Recent Hancitor Attacks
Hancitor
2018-02-07Palo Alto Networks Unit 42Simon Conant
RAT Trapped? LuminosityLink Falls Foul of Vermin Eradication Efforts
Luminosity RAT
2018-02-07TalosMartin Lee, Paul Rascagnères
Targeted Attacks In The Middle East
Operation Parliament
2018-02-07CylanceThreat Research Team
Threat Spotlight: URSNIF Infostealer Malware
ISFB
2018-02-05Objective-SeePatrick Wardle
Analyzing OSX/CreativeUpdater
CreativeUpdater
2018-02-05Patrick Wardle
Analyzing OSX/CreativeUpdater a macOS cryptominer, distributed via macupdate.com
CreativeUpdater
2018-02-04Check PointMark Lechtik
DorkBot: An Investigation
NgrBot
2018-02-03FireEyeFireEye
Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations
TEMP.Hermit
2018-02-02McAfeeRyan Sherstobitoff
Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems
Running RAT
2018-02-02MalwarebytesThomas Reed
New Mac cryptominer distributed via a MacUpdate hack
CreativeUpdater
2018-02-01BitdefenderBitdefender Team
Operation PZCHAO Inside a highly specialized espionage infrastructure
Ghost RAT APT27
2018-02-01BitdefenderBogdan Botezatu, Ivona Alexandra Chili
Operation PZChao: a possible return of the Iron Tiger APT
APT27
2018-01-31Sophos Naked SecurityPaul Ducklin
What are “WannaMine” attacks, and how do I avoid them?
WannaMine
2018-01-31ProofpointKafeine
Smominru Monero mining botnet making millions for operators
MyKings Spreader Smominru
2018-01-30MalwarebytesMalwarebytes Labs
GandCrab ransomware distributed by RIG and GrandSoft exploit kits (updated)
Gandcrab
2018-01-29Palo Alto Networks Unit 42Juan Cortes, Tom Lancaster
VERMIN: Quasar RAT and Custom Malware Used In Ukraine
Vermin
2018-01-27Accenture SecurityAccenture Security, Bart Parys
LATEST CYBER ESPIONAGE MALWARE ATTACKS - DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES
Elise
2018-01-26Palo Alto Networks Unit 42Josh Grunzweig
The TopHat Campaign: Attacks Within The Middle East Region Using Popular Third-Party Services
Scote
2018-01-26Bleeping ComputerLawrence Abrams
The Velso Ransomware Being Manually Installed by Attackers
Velso