Click here to download all references as Bib-File.•
2015-03-11
⋅
Kaspersky Labs
⋅
Inside the EquationDrug Espionage Platform EquationDrug |
2015-03-07
⋅
CERT.PL
⋅
Slave, Banatrix and ransomware Slave |
2015-03-06
⋅
Kaspersky Labs
⋅
Animals in the APT Farm SNOWGLOBE |
2015-02-27
⋅
ThreatConnect
⋅
The Anthem Hack: All Roads Lead to China HttpBrowser |
2015-02-27
⋅
ThreatConnect
⋅
The Anthem Hack: All Roads Lead to China Derusbi |
2015-02-25
⋅
Trend Micro
⋅
OPERATION ARID VIPER: Bypassing the Iron Dome AridViper |
2015-02-23
⋅
CrowdStrike
⋅
Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning |
2015-02-18
⋅
Cyphort
⋅
Babar: Suspected Nation State Spyware In The Spotlight Babar Evilbunny SNOWGLOBE |
2015-02-18
⋅
Vice Motherboard
⋅
Meet Babar, a New Malware Almost Certainly Created by France SNOWGLOBE |
2015-02-18
⋅
Trend Micro
⋅
Sexually Explicit Material Used as Lures in Recent Cyber Attacks AridViper |
2015-02-18
⋅
G Data
⋅
Babar: espionage software finally found and put under the microscope Evilbunny SNOWGLOBE |
2015-02-17
⋅
Avast
⋅
Angry Android hacker hides Xbot malware in popular application icons Xbot |
2015-02-17
⋅
Kaspersky Labs
⋅
The Desert Falcons targeted attacks AridViper |
2015-02-16
⋅
Kaspersky Labs
⋅
Equation: The Death Star of Malware Galaxy DoubleFantasy EquationDrug Fanny GROK |
2015-02-16
⋅
Kaspersky Labs
⋅
Equation: The Death Star of Malware Galaxy Fanny |
2015-02-16
⋅
Ars Technica
⋅
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last Equation Group |
2015-02-11
⋅
FIRST Tbilisi
⋅
Turla-development & operations Turla |
2015-02-10
⋅
CrowdStrike
⋅
Global Threat Intel Report MAGNETIC SPIDER PALE PANDA PREDATOR PANDA SABRE PANDA SPICY PANDA WET PANDA |
2015-02-06
⋅
CrowdStrike
⋅
CrowdStrike Global Threat Intel Report 2014 BlackPOS CryptoLocker Derusbi Elise Enfal EvilGrab Gameover P2P HttpBrowser Medusa Mirage Naikon NetTraveler pirpi PlugX Poison Ivy Sakula RAT Sinowal sykipot taidoor |
2015-02-05
⋅
FireEye
⋅
Anatomy of a Brute Force Campaign: The Story of Hee Thai Limited XOR DDoS |