Click here to download all references as Bib-File.•
2012-11-16
⋅
Information on Security Blog
⋅
China Chopper Webshell - the 4KB that Owns your Web Server |
2012-11-05
⋅
Malwarebytes
⋅
Citadel: a cyber-criminal’s ultimate weapon? Citadel |
2012-10-12
⋅
The Mac Security Blog
⋅
New Multiplatform Backdoor Jacksbot Discovered jRAT |
2012-10-09
⋅
Trend Micro
⋅
BKDR_SARHUST.A Sarhust |
2012-09-28
⋅
Dancho Danchev's Blog
⋅
Dissecting 'Operation Ababil' - an OSINT Analysis Cyber fighters of Izz Ad-Din Al Qassam |
2012-08-23
⋅
Trend Micro
⋅
The Taidoor Campaign: AN IN-DEPTH ANALYSIS taidoor Taidoor |
2012-08-20
⋅
Symantec
⋅
Crisis for Windows Sneaks onto Virtual Machines Crisis RCS |
2012-08-16
⋅
Symantec
⋅
The Shamoon Attacks DistTrack OilRig |
2012-08-16
⋅
Symantec
⋅
The Shamoon Attacks OilRig |
2012-08-16
⋅
Kaspersky Labs
⋅
Shamoon the Wiper – Copycats at Work DistTrack |
2012-08-10
⋅
Contagiodump Blog
⋅
Gauss samples - Nation-state cyber-surveillance + Banking trojan Gauss |
2012-08-03
⋅
Contagio Dump
⋅
Cridex Analysis using Volatility Feodo |
2012-08-02
⋅
Cridex Analysis using Volatility Feodo |
2012-07-26
⋅
Blog (Artem Baranov)
⋅
Investigation an interesting kernel mode stealer Lechiket |
2012-07-26
⋅
Kaspersky Labs
⋅
The Madi Campaign – Part II Madi |
2012-07-25
⋅
Threatpost
⋅
New and Improved Madi Spyware Campaign Continues Madi |
2012-07-22
⋅
Malware.lu
⋅
Xtreme RAT analysis Xtreme RAT |
2012-07-18
⋅
Symantec
⋅
The Madi Attacks: Series of Social Engineering Campaigns Madi |
2012-07-17
⋅
Kaspersky Labs
⋅
The Madi Campaign – Part I Madi |
2012-07-17
⋅
Symantec
⋅
The Madi Attacks: Series of Social Engineering Campaigns Madi |