Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2012Norman ASASnorre Fagerland
@techreport{fagerland:2012:many:c938856, author = {Snorre Fagerland}, title = {{The many faces of Gh0st Rat}}, date = {2012}, institution = {Norman ASA}, url = {http://download01.norman.no/documents/ThemanyfacesofGh0stRat.pdf}, language = {English}, urldate = {2019-12-20} } The many faces of Gh0st Rat
Ghost RAT
2012SymantecNicolas Falliere
@techreport{falliere:2012:w32qakbot:974b5b5, author = {Nicolas Falliere}, title = {{W32.Qakbot in Detail}}, date = {2012}, institution = {Symantec}, url = {http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_qakbot_in_detail.pdf}, language = {English}, urldate = {2019-11-28} } W32.Qakbot in Detail
QakBot
2011-12-08SymantecVikram Thakur
@online{thakur:20111208:sykipot:cf66ef3, author = {Vikram Thakur}, title = {{The Sykipot Attacks}}, date = {2011-12-08}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/sykipot-attacks}, language = {English}, urldate = {2019-10-15} } The Sykipot Attacks
sykipot
2011-11-23SymantecSymantec
@online{symantec:20111123:w32duqu:05cefba, author = {Symantec}, title = {{W32.Duqu: The precursor to the next Stuxnet}}, date = {2011-11-23}, organization = {Symantec}, url = {https://docs.broadcom.com/doc/w32-duqu-11-en}, language = {English}, urldate = {2021-07-26} } W32.Duqu: The precursor to the next Stuxnet
DuQu
2011-11-11Project2049Mark A. Stokes, Jenny Lin, L.C. Russell Hsiao
@techreport{stokes:20111111:chinese:8fac765, author = {Mark A. Stokes and Jenny Lin and L.C. Russell Hsiao}, title = {{The Chinese People’s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure}}, date = {2011-11-11}, institution = {Project2049}, url = {https://project2049.net/wp-content/uploads/2018/05/pla_third_department_sigint_cyber_stokes_lin_hsiao.pdf}, language = {English}, urldate = {2021-05-17} } The Chinese People’s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure
2011-10-31Trend MicroNart Villeneuve
@online{villeneuve:20111031:significance:4039c39, author = {Nart Villeneuve}, title = {{The Significance of the "Nitro" Attacks}}, date = {2011-10-31}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/the-significance-of-the-nitro-attacks/}, language = {English}, urldate = {2020-01-08} } The Significance of the "Nitro" Attacks
Nitro
2011-10-26IntegoPeter James
@online{james:20111026:tsunami:7815511, author = {Peter James}, title = {{Tsunami Backdoor Can Be Used for Denial of Service Attacks}}, date = {2011-10-26}, organization = {Intego}, url = {https://www.intego.com/mac-security-blog/tsunami-backdoor-can-be-used-for-denial-of-service-attacks}, language = {English}, urldate = {2019-10-25} } Tsunami Backdoor Can Be Used for Denial of Service Attacks
Tsunami
2011-10-13Frankie Fu Kay Li
@online{li:20111013:detailed:650b25e, author = {Frankie Fu Kay Li}, title = {{A Detailed Analysis of an Advanced Persistent Threat Malware}}, date = {2011-10-13}, url = {https://www.sans.org/reading-room/whitepapers/malicious/detailed-analysis-advanced-persistent-threat-malware-33814}, language = {English}, urldate = {2019-10-14} } A Detailed Analysis of an Advanced Persistent Threat Malware
woody
2011-10-08F-SecureMikko
@online{mikko:20111008:possible:a0424c6, author = {Mikko}, title = {{Possible Governmental Backdoor Found ("Case R2D2")}}, date = {2011-10-08}, organization = {F-Secure}, url = {https://www.f-secure.com/weblog/archives/00002249.html}, language = {English}, urldate = {2020-01-05} } Possible Governmental Backdoor Found ("Case R2D2")
Bundestrojaner
2011-10-08CCCCCC
@techreport{ccc:20111008:analyse:0c4a8c9, author = {CCC}, title = {{ANALYSE EINER REGIERUNGS-MALWARE}}, date = {2011-10-08}, institution = {CCC}, url = {http://www.ccc.de/system/uploads/76/original/staatstrojaner-report23.pdf}, language = {English}, urldate = {2020-01-07} } ANALYSE EINER REGIERUNGS-MALWARE
Bundestrojaner
2011-10-07Contagiodump BlogMila Parkour
@online{parkour:20111007:rustock:d35b63c, author = {Mila Parkour}, title = {{Rustock samples and analysis links. Rustock.C, E, I, J and other variants}}, date = {2011-10-07}, organization = {Contagiodump Blog}, url = {http://contagiodump.blogspot.com/2011/10/rustock-samples-and-analysis-links.html}, language = {English}, urldate = {2019-12-20} } Rustock samples and analysis links. Rustock.C, E, I, J and other variants
Rustock
2011-10-06Kaspersky LabsDenis Maslennikov
@online{maslennikov:20111006:zeusinthemobile:ea34d2e, author = {Denis Maslennikov}, title = {{ZeuS-in-the-Mobile – Facts and Theories}}, date = {2011-10-06}, organization = {Kaspersky Labs}, url = {https://securelist.com/zeus-in-the-mobile-facts-and-theories/36424/}, language = {English}, urldate = {2020-02-04} } ZeuS-in-the-Mobile – Facts and Theories
ZitMo
2011-10-06Contagio DumpMila Parkour
@online{parkour:20111006:sep:df13936, author = {Mila Parkour}, title = {{Sep 28 CVE-2010-3333 Manuscript with Taidoor (Trojan.Matryoshka by CyberESI)}}, date = {2011-10-06}, organization = {Contagio Dump}, url = {http://contagiodump.blogspot.com/2011/10/sep-28-cve-2010-3333-manuscript-with.html}, language = {English}, urldate = {2019-12-20} } Sep 28 CVE-2010-3333 Manuscript with Taidoor (Trojan.Matryoshka by CyberESI)
taidoor
2011-09-27malwareninja
@online{malwareninja:20110927:debugging:0033a33, author = {malwareninja}, title = {{Debugging Injected Code with IDA Pro}}, date = {2011-09-27}, url = {https://malwarereversing.wordpress.com/2011/09/27/debugging-injected-code-with-ida-pro/}, language = {English}, urldate = {2019-08-07} } Debugging Injected Code with IDA Pro
Shylock
2011-09-21Contagiodump BlogMila Parkour
@online{parkour:20110921:sept:726c3e3, author = {Mila Parkour}, title = {{Sept 21 Greedy Shylock - financial malware}}, date = {2011-09-21}, organization = {Contagiodump Blog}, url = {http://contagiodump.blogspot.com/2011/09/sept-21-greedy-shylock-financial.html}, language = {English}, urldate = {2019-12-20} } Sept 21 Greedy Shylock - financial malware
Shylock
2011-09-19Contagio DumpMila Parkour
@online{parkour:20110919:mebromi:687fbb9, author = {Mila Parkour}, title = {{Mebromi BIOS rootkit affecting Award BIOS (aka "BMW" virus)}}, date = {2011-09-19}, organization = {Contagio Dump}, url = {http://contagiodump.blogspot.com/2011/09/mebromi-bios-rootkit-affecting-award.html}, language = {English}, urldate = {2019-12-20} } Mebromi BIOS rootkit affecting Award BIOS (aka "BMW" virus)
Mebromi
2011-09-14The RegisterDan Goodin
@online{goodin:20110914:malware:c1e8db0, author = {Dan Goodin}, title = {{Malware burrows deep into computer BIOS to escape AV}}, date = {2011-09-14}, organization = {The Register}, url = {http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/}, language = {English}, urldate = {2020-01-06} } Malware burrows deep into computer BIOS to escape AV
Mebromi
2011-09-14Kaspersky LabsDmitry Tarakanov
@online{tarakanov:20110914:ice:4373c96, author = {Dmitry Tarakanov}, title = {{Ice IX: not cool at all}}, date = {2011-09-14}, organization = {Kaspersky Labs}, url = {https://securelist.com/ice-ix-not-cool-at-all/29111/}, language = {English}, urldate = {2019-12-20} } Ice IX: not cool at all
Ice IX
2011-09-13WebrootMarco Giuliani
@online{giuliani:20110913:mebromi:2d33f8d, author = {Marco Giuliani}, title = {{Mebromi: the first BIOS rootkit in the wild}}, date = {2011-09-13}, organization = {Webroot}, url = {https://www.webroot.com//blog/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/}, language = {English}, urldate = {2020-01-08} } Mebromi: the first BIOS rootkit in the wild
Mebromi
2011-09-09CodeProjectAmrThabet
@online{amrthabet:20110909:stuxnet:07c5348, author = {AmrThabet}, title = {{Stuxnet Malware Analysis Paper}}, date = {2011-09-09}, organization = {CodeProject}, url = {https://www.codeproject.com/articles/246545/stuxnet-malware-analysis-paper}, language = {English}, urldate = {2020-11-13} } Stuxnet Malware Analysis Paper
Stuxnet