Click here to download all references as Bib-File.•
2011-06-29
⋅
Symantec
⋅
Inside a Back Door Attack Dust Storm |
2011-04-28
⋅
Un observateur d’événements aveugle… MimiKatz |
2011-03-22
⋅
FireEye
⋅
Harnig Botnet: a retreating army Harnig |
2011-02-24
⋅
Contagiodump Blog
⋅
ZeroAccess / Max++ / Smiscer Crimeware Rootkit sample for Step-by-Step Reverse Engineering by Giuseppe Bonfa - << (Update 2011 version available) ZeroAccess |
2011-02-10
⋅
McAfee
⋅
Global Energy Cyberattacks: “Night Dragon” Night Dragon |
2011-01-20
⋅
⋅
Beschreibung des Virus Backdoor.Win32. Buterat.afj Buterat |
2011-01-03
⋅
ESET Research
⋅
Stuxnet Under the Microscope Stuxnet |
2011-01-01
⋅
The Brown Journal of World Affairs
⋅
The Spectrum of National Responsibility for Cyberattacks |
2011-01-01
⋅
Symantec
⋅
The Nitro Attacks: Stealing Secrets from the Chemical Industry Poison Ivy Nitro |
2011-01-01
⋅
Symantec
⋅
The Nitro Attacks Nitro |
2011-01-01
⋅
Spiegel Online
⋅
SNOWGLOBE: From Discovery to Attribution Babar |
2010-12-14
⋅
FireEye
⋅
Leouncia - Yet Another Backdoor - Part 2 Leouncia |
2010-12-14
⋅
FireEye
⋅
Leouncia - Yet Another Backdoor |
2010-11-01
⋅
InfoSec Institute
⋅
ZEROACCESS MALWARE - PART 1: De-Obfuscating and Reversing the User-Mode Agent Dropper ZeroAccess |
2010-10-27
⋅
FireEye
⋅
Bredolab - It's not the size of the dog in the fight.. Bredolab |
2010-09-17
⋅
KrebsOnSecurity
⋅
SpyEye Botnet’s Bogus Billing Feature SpyEye |
2010-08-25
⋅
The New York Times
⋅
Military Computer Attack Confirmed Turla |
2010-07-14
⋅
The Atlantic
⋅
Who Was the 12th Russian Spy at Microsoft? |
2010-05-28
⋅
ContagioDump
⋅
CVE-2009-3129 XLS for office 2002-2007 with fud keylogger EIDHR from david@humanright-watch.org Maudi |
2010-05-27
⋅
SANS ISC InfoSec Forums
⋅
Sasfis Propagation Sasfis |