Click here to download all references as Bib-File.•
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage |
2015-08-05
⋅
Ars Technica
⋅
Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes” APT27 |
2015-08-05
⋅
Black Hat
⋅
Gameover Zeus – Bad Guys and Backends Gameover P2P |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-29
⋅
Youtube (FireEye Inc.)
⋅
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group tDiscoverer |
2015-07-27
⋅
Palo Alto Networks Unit 42
⋅
UPS: Observations on CVE-2015-3113, Prior Zero-Days and the Pirpi Payload pirpi |
2015-07-22
⋅
F-Secure
⋅
Duke APT group's latest tools: cloud services and Linux support CloudDuke |
2015-07-20
⋅
paloalto Networks Unit 42
⋅
Watering Hole Attack on Aerospace Firm Exploits CVE-2015-5122 to Install IsSpace Backdoor IsSpace |
2015-07-13
⋅
Symantec
⋅
“Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory SEADADDY |
2015-07-08
⋅
Symantec
⋅
Butterfly: Profiting from high-level corporate attacks WildNeutron |
2015-07-08
⋅
Kaspersky Labs
⋅
Wild Neutron – Economic espionage threat actor returns with new tricks JripBot |
2015-07-08
⋅
Kaspersky Labs
⋅
Wild Neutron – Economic espionage threat actor returns with new tricks WildNeutron |
2015-07-01
⋅
FireEye
⋅
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group tDiscoverer APT29 |
2015-06-26
⋅
Rovnix Payload Analysis ReactorBot |
2015-06-25
⋅
Proofpoint
⋅
Sundown EK Spreads LuminosityLink RAT: Light After Dark Luminosity RAT |
2015-06-24
⋅
Malwarebytes
⋅
Elusive HanJuan EK Drops New Tinba Version (updated) Fobber |
2015-06-24
⋅
Spiceworks
⋅
Stealthy Cyberespionage Campaign Attacks With Social Engineering NanHaiShu |
2015-06-23
⋅
Reuters
⋅
Exclusive: SEC hunts hackers who stole corporate emails to trade stocks WOLF SPIDER |
2015-06-23
⋅
FireEye
⋅
Operation Clandestine Wolf – Adobe Flash Zero-Day in APT3 Phishing Campaign APT3 |