Click here to download all references as Bib-File.•
2015-04-01
⋅
FireEye
⋅
APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION BACKBEND backspace CREAMSICLE FLASHFLOOD GEMCUTTER MILKMAID Naikon NETEAGLE ORANGEADE SHIPSHAPE SPACESHIP SslMM Sys10 WinMM xsPlus APT30 |
2015-03-31
⋅
Check Point Research
⋅
Volatile Cedar - Analysis of a Global Cyber Espionage Campaign Volatile Cedar |
2015-03-31
⋅
Kaspersky Labs
⋅
Sinkholing Volatile Cedar DGA Infrastructure Volatile Cedar |
2015-03-30
⋅
Check Point
⋅
Volatile Cedar Volatile Cedar |
2015-03-30
⋅
Symantec
⋅
New reconnaissance threat Trojan.Laziok targets the energy sector Laziok |
2015-03-30
⋅
Trend Micro
⋅
Fake Judicial Spam Leads to Backdoor with Fake Certificate Authority GootKit |
2015-03-24
⋅
Trend Micro
⋅
Operation Woolen-Goldfish: When Kittens Go Phishing Ghole Woolger |
2015-03-20
⋅
Cisco Talos
⋅
Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware FindPOS |
2015-03-19
⋅
Trend Micro
⋅
Operation WOOLEN-GOLDFISH: When Kittens Go Phishing Ghole Woolger |
2015-03-19
⋅
Analyzing a Backdoor/Bot forthe MIPS Platform TheMoon |
2015-03-19
⋅
Trend Micro
⋅
Rocket Kitten Showing Its Claws: Operation Woolen-GoldFish and the GHOLE campaign Cleaver Rocket Kitten |
2015-03-18
⋅
Seattle Times
⋅
Feds warned Premera about security flaws before breach APT19 |
2015-03-11
⋅
Kaspersky Labs
⋅
Inside the EquationDrug Espionage Platform EquationDrug |
2015-03-07
⋅
CERT.PL
⋅
Slave, Banatrix and ransomware Slave |
2015-03-06
⋅
Kaspersky Labs
⋅
Animals in the APT Farm SNOWGLOBE |
2015-02-27
⋅
ThreatConnect
⋅
The Anthem Hack: All Roads Lead to China HttpBrowser |
2015-02-27
⋅
ThreatConnect
⋅
The Anthem Hack: All Roads Lead to China Derusbi |
2015-02-25
⋅
Trend Micro
⋅
OPERATION ARID VIPER: Bypassing the Iron Dome AridViper |
2015-02-23
⋅
CrowdStrike
⋅
Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning |
2015-02-18
⋅
Cyphort
⋅
Babar: Suspected Nation State Spyware In The Spotlight Babar Evilbunny SNOWGLOBE |