Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-04-03Vitali Kremez BlogVitali Kremez
Let's Learn: Trickbot Implements Network Collector Module Leveraging CMD, WMI & LDAP
TrickBot
2018-04-02Cisco TalosJungsoo An, Paul Rascagnères, Vitor Ventura, Warren Mercer
Fake AV Investigation Unearths KevDroid, New Android Malware
KevDroid PubNubRAT
2018-04-01SophosDorka Palotay, Peter Mackenzie
SamSam Ransomware Chooses Its Targets Carefully
SamSam
2018-03-31Youtube (hasherezade)hasherezade
Deobfuscating TrickBot's strings with libPeConv
TrickBot
2018-03-30Trend MicroDavid Sancho, Massimiliano Michenz, Numaan Huq
Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types
Project Alice ATMitch Ploutus ATM Ripper ATM Skimer SUCEFUL Tyupkin
2018-03-30360 Threat IntelligenceQi Anxin Threat Intelligence Center
Analysis of the latest cyber attack activity of the APT organization against sensitive institutions in China
Quasar RAT
2018-03-30AmosSysFlorent Saudel
BADFLICK is not so bad!
badflick
2018-03-30Kahu SecurityKahu Security
Reflow JavaScript Backdoor
AIRBREAK
2018-03-29StormshieldRémi Jullian
In-depth Formbook malware analysis – Obfuscation and process injection
Formbook
2018-03-29Trend MicroMingYen Hsieh, Tamada Kiyotaka
ChessMaster Adds Updated Tools to Its Arsenal
Anel
2018-03-28NetlabHajime
Quick summary about the Port 8291 scan
Hajime
2018-03-28Robert Michel
Dissecting Olympic Destroyer – a walk-through
Olympic Destroyer
2018-03-27Trend MicroTrendmicro
Evolving Trickbot Adds Detection Evasion and Screen-Locking Features
TrickBot
2018-03-27NetScoutDennis Schwarz
Panda Banker Zeros in on Japanese Targets
2018-03-25Vitali Kremez BlogVitali Kremez
Let's Learn: Internals of Iranian-Based Threat Group "Chafer" Malware: Autoit and PowerShell Persistence
OilRig
2018-03-23FireEyeSudeep Singh, Yijie Sui
Sanny malware delivery method updated in recently observed attacks.
Sanny
2018-03-22Sekoiasekoia
Falling on MuddyWater
POWERSTATS
2018-03-22MinervaAsaf Aprozper, Gal Bitensky
GhostMiner: Cryptomining Malware Goes Fileless
GhostMiner
2018-03-21WebrootJason Davison
TrickBot Banking Trojan Adapts with New Module
TrickBot
2018-03-21Malware Breakdown BlogMalware Breakdown
Fobos Malvertising Campaign Delivers Bunitu Proxy Trojan via RIG EK
Bunitu