Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-06-26Kaspersky LabsGReAT
@online{great:20190626:viceleaker:7145f5f, author = {GReAT}, title = {{ViceLeaker Operation: mobile espionage targeting Middle East}}, date = {2019-06-26}, organization = {Kaspersky Labs}, url = {https://securelist.com/fanning-the-flames-viceleaker-operation/90877/}, language = {English}, urldate = {2019-12-20} } ViceLeaker Operation: mobile espionage targeting Middle East
ViceLeaker
2019-06-25Kaspersky LabsTatyana Shishkova
@online{shishkova:20190625:riltok:14308bf, author = {Tatyana Shishkova}, title = {{Riltok mobile Trojan: A banker with global reach}}, date = {2019-06-25}, organization = {Kaspersky Labs}, url = {https://securelist.com/mobile-banker-riltok/91374/}, language = {English}, urldate = {2019-12-20} } Riltok mobile Trojan: A banker with global reach
Riltok
2019-06-18Kaspersky LabsAnton Kuzmenko
@online{kuzmenko:20190618:plurox:14d4e0d, author = {Anton Kuzmenko}, title = {{Plurox: Modular backdoor}}, date = {2019-06-18}, organization = {Kaspersky Labs}, url = {https://securelist.com/plurox-modular-backdoor/91213/}, language = {English}, urldate = {2019-12-20} } Plurox: Modular backdoor
Plurox
2019-06-03Kaspersky LabsGReAT
@online{great:20190603:zebrocys:25be7a9, author = {GReAT}, title = {{Zebrocy’s Multilanguage Malware Salad}}, date = {2019-06-03}, organization = {Kaspersky Labs}, url = {https://securelist.com/zebrocys-multilanguage-malware-salad/90680/}, language = {English}, urldate = {2019-12-20} } Zebrocy’s Multilanguage Malware Salad
Zebrocy
2019-05-13Kaspersky LabsGReAT
@online{great:20190513:scarcruft:eb8bb1c, author = {GReAT}, title = {{ScarCruft continues to evolve, introduces Bluetooth harvester}}, date = {2019-05-13}, organization = {Kaspersky Labs}, url = {https://securelist.com/scarcruft-continues-to-evolve-introduces-bluetooth-harvester/90729/}, language = {English}, urldate = {2019-12-20} } ScarCruft continues to evolve, introduces Bluetooth harvester
Konni RokRAT UACMe APT37
2019-05-08Kaspersky LabsYury Namestnikov, Félix Aime
@online{namestnikov:20190508:fin75:443b111, author = {Yury Namestnikov and Félix Aime}, title = {{FIN7.5: the infamous cybercrime rig “FIN7” continues its activities}}, date = {2019-05-08}, organization = {Kaspersky Labs}, url = {https://securelist.com/fin7-5-the-infamous-cybercrime-rig-fin7-continues-its-activities/90703/}, language = {English}, urldate = {2019-12-20} } FIN7.5: the infamous cybercrime rig “FIN7” continues its activities
Griffon Ave Maria FIN7
2019-05-08Kaspersky LabsKaspersky Labs
@online{labs:20190508:fin7:6874fc6, author = {Kaspersky Labs}, title = {{Fin7 hacking group targets more than 130 companies after leaders’ arrest}}, date = {2019-05-08}, organization = {Kaspersky Labs}, url = {https://www.kaspersky.com/about/press-releases/2019_fin7-hacking-group-targets-more-than-130-companies-after-leaders-arrest}, language = {English}, urldate = {2020-03-22} } Fin7 hacking group targets more than 130 companies after leaders’ arrest
Ave Maria ANTHROPOID SPIDER
2019-04-23Kaspersky LabsGReAT, AMR
@online{great:20190423:operation:20b8f83, author = {GReAT and AMR}, title = {{Operation ShadowHammer: a high-profile supply chain attack}}, date = {2019-04-23}, organization = {Kaspersky Labs}, url = {https://securelist.com/operation-shadowhammer-a-high-profile-supply-chain-attack/90380/}, language = {English}, urldate = {2019-12-20} } Operation ShadowHammer: a high-profile supply chain attack
shadowhammer ShadowPad
2019-04-10Kaspersky LabsKaspersky Team
@online{team:20190410:gaza:d5f5a32, author = {Kaspersky Team}, title = {{The Gaza cybergang and its SneakyPastes campaign}}, date = {2019-04-10}, organization = {Kaspersky Labs}, url = {https://www.kaspersky.com/blog/gaza-cybergang/26363/}, language = {English}, urldate = {2019-12-18} } The Gaza cybergang and its SneakyPastes campaign
Molerats
2019-04-10Kaspersky LabsAMR, GReAT
@online{amr:20190410:project:460b6e5, author = {AMR and GReAT}, title = {{Project TajMahal – a sophisticated new APT framework}}, date = {2019-04-10}, organization = {Kaspersky Labs}, url = {https://securelist.com/project-tajmahal/90240/}, language = {English}, urldate = {2019-12-20} } Project TajMahal – a sophisticated new APT framework
Chaperone
2019-04-04Kaspersky LabsGReAT
@online{great:20190404:basbanke:d59ada6, author = {GReAT}, title = {{BasBanke: Trend-setting Brazilian banking Trojan}}, date = {2019-04-04}, organization = {Kaspersky Labs}, url = {https://securelist.com/basbanke-trend-setting-brazilian-banking-trojan/90365/}, language = {English}, urldate = {2021-04-14} } BasBanke: Trend-setting Brazilian banking Trojan
Basbanke
2019-03-28Kaspersky LabsGReAT
@online{great:20190328:return:be8d0b5, author = {GReAT}, title = {{The return of the BOM}}, date = {2019-03-28}, organization = {Kaspersky Labs}, url = {https://securelist.com/the-return-of-the-bom/90065/}, language = {English}, urldate = {2019-12-20} } The return of the BOM
Unidentified 058
2019-03-26Kaspersky LabsGReAT
@online{great:20190326:cryptocurrency:c95b701, author = {GReAT}, title = {{Cryptocurrency businesses still being targeted by Lazarus}}, date = {2019-03-26}, organization = {Kaspersky Labs}, url = {https://securelist.com/cryptocurrency-businesses-still-being-targeted-by-lazarus/90019/}, language = {English}, urldate = {2019-12-20} } Cryptocurrency businesses still being targeted by Lazarus
Yort Lazarus Group
2019-03-25Kaspersky LabsGReAT, AMR
@online{great:20190325:operation:c4bf341, author = {GReAT and AMR}, title = {{Operation ShadowHammer}}, date = {2019-03-25}, organization = {Kaspersky Labs}, url = {https://securelist.com/operation-shadowhammer/89992/}, language = {English}, urldate = {2019-12-20} } Operation ShadowHammer
shadowhammer Operation ShadowHammer
2019-03-22Kaspersky LabsAlexander Eremin
@online{eremin:20190322:azorult:3080ee5, author = {Alexander Eremin}, title = {{AZORult++: Rewriting history}}, date = {2019-03-22}, organization = {Kaspersky Labs}, url = {https://securelist.com/azorult-analysis-history/89922/}, language = {English}, urldate = {2019-12-20} } AZORult++: Rewriting history
Azorult
2019-03-13Kaspersky LabsVasily Berdnikov, Boris Larin
@online{berdnikov:20190313:fourth:98b1131, author = {Vasily Berdnikov and Boris Larin}, title = {{The fourth horseman: CVE-2019-0797 vulnerability}}, date = {2019-03-13}, organization = {Kaspersky Labs}, url = {https://securelist.com/cve-2019-0797-zero-day-vulnerability/89885/}, language = {English}, urldate = {2019-12-20} } The fourth horseman: CVE-2019-0797 vulnerability
Stealth Falcon
2019-03-11Kaspersky LabsGReAT
@online{great:20190311:predatory:63ab818, author = {GReAT}, title = {{A predatory tale: Who’s afraid of the thief?}}, date = {2019-03-11}, organization = {Kaspersky Labs}, url = {https://securelist.com/a-predatory-tale/89779}, language = {English}, urldate = {2019-12-20} } A predatory tale: Who’s afraid of the thief?
Predator The Thief
2019-02-20Kaspersky LabsPavel Shoshin
@online{shoshin:20190220:cybercrime:3fc9944, author = {Pavel Shoshin}, title = {{Cybercrime is focusing on accountants}}, date = {2019-02-20}, organization = {Kaspersky Labs}, url = {https://www.kaspersky.com/blog/financial-trojans-2019/25690/}, language = {English}, urldate = {2019-12-05} } Cybercrime is focusing on accountants
BuhTrap
2019-02-19Kaspersky LabsKonstantin Zykov
@online{zykov:20190219:atm:b3f678e, author = {Konstantin Zykov}, title = {{ATM robber WinPot: a slot machine instead of cutlets}}, date = {2019-02-19}, organization = {Kaspersky Labs}, url = {https://securelist.com/atm-robber-winpot/89611/}, language = {English}, urldate = {2019-12-20} } ATM robber WinPot: a slot machine instead of cutlets
WinPot
2019-01-30Kaspersky LabsDenis Legezo
@online{legezo:20190130:chafer:bb3ce4d, author = {Denis Legezo}, title = {{Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities}}, date = {2019-01-30}, organization = {Kaspersky Labs}, url = {https://securelist.com/chafer-used-remexi-malware/89538/}, language = {English}, urldate = {2019-12-20} } Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities
Remexi APT39