Click here to download all references as Bib-File.•
2013-01-19
⋅
Spamhaus
⋅
Cooperative Efforts To Shut Down Virut Botnet Virut |
2013-01-18
⋅
Contagiodump Blog
⋅
Dec 2012 Batchwiper Samples BatchWiper |
2013-01-17
⋅
Kaspersky Labs
⋅
“Red October” – Part Two, the Modules Inception Framework |
2013-01-14
⋅
Kaspersky Labs
⋅
“Red October” Diplomatic Cyber Attacks Investigation Inception Framework |
2013-01-14
⋅
Kaspersky Labs
⋅
The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies Inception Framework |
2013-01-14
⋅
Kaspersky Labs
⋅
"Red October" Diplomatic Cyber Attacks Investigation Inception Framework |
2013-01-02
⋅
Capstone Turbine Corporation Also Targeted in the CFR Watering Hole Attack And More APT19 |
2013-01-01
⋅
FireEye
⋅
APTs By The Dozen: Dissecting Advanced Attacks Korlia |
2013-01-01
⋅
McAfee
⋅
Dissecting Operation Troy: Cyberespionage in South Korea httpdropper |
2013-01-01
⋅
Trend Micro
⋅
FAKEM RAT Terminator RAT |
2012-12-29
⋅
Eric Romang Blog
⋅
Attack and IE 0day Informations Used Against Council on Foreign Relations APT19 |
2012-12-23
⋅
Contagio Dump
⋅
Dec 2012 Dexter - POS Infostealer samples and information Dexter |
2012-12-19
⋅
ESET Research
⋅
Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems Ranbyus |
2012-12-12
⋅
Volatility Labs
⋅
Unpacking Dexter POS "Memory Dump Parsing" Malware Dexter |
2012-12-05
⋅
Malware Don't Need Coffee
⋅
The path to infection - Eye glance at the first line of "Russian Underground" - focused on Ransomware RunForestRun Andromeda Citadel Lyposit Matsnu Reveton Sinowal UPAS Urausy |
2012-12-03
⋅
F-Secure
⋅
New Mac Malware Found on Dalai Lama Related Website Dockster |
2012-11-29
⋅
Trend Micro
⋅
What’s the Fuss with WORM_VOBFUS? Vobfus |
2012-11-27
⋅
Sophos
⋅
Threat Description: Troj/Ployx-A ployx |
2012-11-22
⋅
Symantec
⋅
W32.Narilam – Business Database Sabotage Narilam |
2012-11-16
⋅
Symantec
⋅
Malware Targeting Windows 8 Uses Google Docs Makadocs |