Click here to download all references as Bib-File.•
2011-10-06
⋅
Contagio Dump
⋅
Sep 28 CVE-2010-3333 Manuscript with Taidoor (Trojan.Matryoshka by CyberESI) taidoor |
2011-09-14
⋅
Kaspersky Labs
⋅
Ice IX: not cool at all Ice IX |
2011-09-09
⋅
Symantec
⋅
BIOS Threat is Showing up Again! Mebromi |
2011-09-02
⋅
Trend Micro
⋅
ZeuS Gets Another Update Ice IX |
2011-08-29
⋅
Contagiodump Blog
⋅
Aug 28 Morto / Tsclient - RDP worm with DDoS features Morto |
2011-08-27
⋅
Microsoft
⋅
Morto.A Morto |
2011-08-09
⋅
FireEye
⋅
Harnig is Back Harnig |
2011-08-03
⋅
Secureworks
⋅
HTran and the Advanced Persistent Threat HTran |
2011-07-27
⋅
Contagiodump Blog
⋅
Jul 25 Mac Olyx backdoor + Gh0st Backdoor in RAR archive related to July 2009 Ürümqi riots in China (Samples included) Olyx Gh0stnet |
2011-07-26
⋅
Computerworld
⋅
SpyEye Trojan defeating online banking defenses SpyEye |
2011-07-07
⋅
Contagio Dump
⋅
Rootkit TDL-4 (TDSS, Alureon.DX, Olmarik, TDL) 32-bit and 64-bit Sample + Analysis links - Update July 7 Alureon |
2011-06-29
⋅
Symantec
⋅
Inside a Back Door Attack Ghost RAT Dust Storm |
2011-06-29
⋅
Symantec
⋅
Inside a Back Door Attack Dust Storm |
2011-04-28
⋅
Un observateur d’événements aveugle… MimiKatz |
2011-03-22
⋅
FireEye
⋅
Harnig Botnet: a retreating army Harnig |
2011-02-24
⋅
Contagiodump Blog
⋅
ZeroAccess / Max++ / Smiscer Crimeware Rootkit sample for Step-by-Step Reverse Engineering by Giuseppe Bonfa - << (Update 2011 version available) ZeroAccess |
2011-02-10
⋅
McAfee
⋅
Global Energy Cyberattacks: “Night Dragon” Night Dragon |
2011-01-20
⋅
⋅
Beschreibung des Virus Backdoor.Win32. Buterat.afj Buterat |
2011-01-03
⋅
ESET Research
⋅
Stuxnet Under the Microscope Stuxnet |
2011-01-01
⋅
The Brown Journal of World Affairs
⋅
The Spectrum of National Responsibility for Cyberattacks |