Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-08-05SecureworksCTU Research Team
Threat Group 3390 Cyberespionage
2015-08-05Ars TechnicaSean Gallagher
Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes”
APT27
2015-08-05Black HatElliott Peterson, Michael Sandee, Tillmann Werner
Gameover Zeus – Bad Guys and Backends
Gameover P2P
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC
2015-07-29Youtube (FireEye Inc.)FireEye
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group
tDiscoverer
2015-07-27Palo Alto Networks Unit 42Richard Wartell, Robert Falcone
UPS: Observations on CVE-2015-3113, Prior Zero-Days and the Pirpi Payload
pirpi
2015-07-22F-SecureArtturi Lehtiö
Duke APT group's latest tools: cloud services and Linux support
CloudDuke
2015-07-20paloalto Networks Unit 42Bryan Lee, Josh Grunzweig
Watering Hole Attack on Aerospace Firm Exploits CVE-2015-5122 to Install IsSpace Backdoor
IsSpace
2015-07-13SymantecA L Johnson
“Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory
SEADADDY
2015-07-08SymantecSymantec Security Response
Butterfly: Profiting from high-level corporate attacks
WildNeutron
2015-07-08Kaspersky LabsGReAT
Wild Neutron – Economic espionage threat actor returns with new tricks
JripBot
2015-07-08Kaspersky LabsGReAT
Wild Neutron – Economic espionage threat actor returns with new tricks
WildNeutron
2015-07-01FireEyeFireEye Threat Intelligence
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group
tDiscoverer APT29
2015-06-26Hanan Natan
Rovnix Payload Analysis
ReactorBot
2015-06-25ProofpointProofpoint Staff
Sundown EK Spreads LuminosityLink RAT: Light After Dark
Luminosity RAT
2015-06-24MalwarebytesJérôme Segura
Elusive HanJuan EK Drops New Tinba Version (updated)
Fobber
2015-06-24SpiceworksChris Miller
Stealthy Cyberespionage Campaign Attacks With Social Engineering
NanHaiShu
2015-06-23ReutersJoseph Menn, Sarah N. Lynch
Exclusive: SEC hunts hackers who stole corporate emails to trade stocks
WOLF SPIDER
2015-06-23FireEyeDan Caselden, Erica Eng
Operation Clandestine Wolf – Adobe Flash Zero-Day in APT3 Phishing Campaign
APT3