Click here to download all references as Bib-File.•
2018-02-08
⋅
Forcepoint
⋅
UDPoS - exfiltrating credit card data via DNS UDPoS |
2018-02-07
⋅
Palo Alto Networks Unit 42
⋅
Compromised Servers & Fraud Accounts: Recent Hancitor Attacks Hancitor |
2018-02-07
⋅
Palo Alto Networks Unit 42
⋅
RAT Trapped? LuminosityLink Falls Foul of Vermin Eradication Efforts Luminosity RAT |
2018-02-07
⋅
Talos
⋅
Targeted Attacks In The Middle East Operation Parliament |
2018-02-07
⋅
Cylance
⋅
Threat Spotlight: URSNIF Infostealer Malware ISFB |
2018-02-05
⋅
Objective-See
⋅
Analyzing OSX/CreativeUpdater CreativeUpdater |
2018-02-05
⋅
Analyzing OSX/CreativeUpdater a macOS cryptominer, distributed via macupdate.com CreativeUpdater |
2018-02-04
⋅
Check Point
⋅
DorkBot: An Investigation NgrBot |
2018-02-03
⋅
FireEye
⋅
Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations TEMP.Hermit |
2018-02-02
⋅
McAfee
⋅
Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems Running RAT |
2018-02-02
⋅
Malwarebytes
⋅
New Mac cryptominer distributed via a MacUpdate hack CreativeUpdater |
2018-02-01
⋅
Bitdefender
⋅
Operation PZCHAO Inside a highly specialized espionage infrastructure Ghost RAT APT27 |
2018-02-01
⋅
Bitdefender
⋅
Operation PZChao: a possible return of the Iron Tiger APT APT27 |
2018-01-31
⋅
Sophos Naked Security
⋅
What are “WannaMine” attacks, and how do I avoid them? WannaMine |
2018-01-31
⋅
Proofpoint
⋅
Smominru Monero mining botnet making millions for operators MyKings Spreader Smominru |
2018-01-30
⋅
Malwarebytes
⋅
GandCrab ransomware distributed by RIG and GrandSoft exploit kits (updated) Gandcrab |
2018-01-29
⋅
Palo Alto Networks Unit 42
⋅
VERMIN: Quasar RAT and Custom Malware Used In Ukraine Vermin |
2018-01-27
⋅
Accenture Security
⋅
LATEST CYBER ESPIONAGE MALWARE ATTACKS - DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES Elise |
2018-01-26
⋅
Palo Alto Networks Unit 42
⋅
The TopHat Campaign: Attacks Within The Middle East Region Using Popular Third-Party Services Scote |
2018-01-26
⋅
Bleeping Computer
⋅
The Velso Ransomware Being Manually Installed by Attackers Velso |