Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-10-17ESET ResearchMathieu Tartare, Matthieu Faou, Thomas Dupuy
OPERATION GHOST The Dukes aren’t back — they never left
FatDuke
2019-10-17ESET ResearchMathieu Tartare, Matthieu Faou, Thomas Dupuy
OPERATION GHOST The Dukes aren’t back — they never left
FatDuke
2019-10-17ESET ResearchESET Research
Operation Ghost: The Dukes aren’t back – they never left
PolyglotDuke
2019-09-19Trend MicroMaverick Pascual
Fileless Cryptocurrency-Miner GhostMiner Weaponizes WMI Objects, Kills Other Cryptocurrency-Mining Payloads
GhostMiner
2019-03-28Malware Explorer BlogNart Villeneuve
10 Years Since Ghostnet
Gh0stnet
2019-01-01Council on Foreign RelationsCyber Operations Tracker
Operation GhostSecret
Lazarus Group
2018-04-24McAfeeRyan Sherstobitoff
Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide
GhostSecret
2018-04-24McAfeeAsheer Malhotra, Ryan Sherstobitoff
Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide
Lazarus Group
2018-04-24McAfeeAsheer Malhotra, Ryan Sherstobitoff
Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide
Lazarus Group
2018-03-22MinervaAsaf Aprozper, Gal Bitensky
GhostMiner: Cryptomining Malware Goes Fileless
GhostMiner
2018-03-22MinervaAsaf Aprozper, Gal Bitensky
GhostMiner: Cryptomining Malware Goes Fileless
GhostMiner
2017-12-04RSAJack Wesley Riley
The Shadows of Ghosts Inside the response of a unique Carbanak intrusion
GOTROJ MimiKatz
2017-07-17Trend MicroCedric Pernet, Jordan Pan, Lenart Bermejo
Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More
GhostCtrl
2017-07-17Trend MicroCedric Pernet, Jordan Pan, Lenart Bermejo
Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More
GhostCtrl
2017-07-17Trend MicroCedric Pernet, Jordan Pan, Lenart Bermejo
Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More
GhostCtrl
2017-07-17Secrary BlogLasha Khasaia
WMIGhost / Wimmie - WMI malware
WMI Ghost
2017-03-28CylanceCylance Threat Research Team
Threat Spotlight: GhostAdmin Malware
GhostAdmin
2017-01-17Bleeping ComputerCatalin Cimpanu
New GhostAdmin Malware Used for Data Theft and Exfiltration
GhostAdmin
2016-04-22CylanceIsaac Palmer
The Ghost Dragon
Ghost RAT
2016-04-13FireEyeDaniel Regalado, Erye Hernandez, Taha Karim, Varun Jian
Ghosts in the Endpoint
PLEAD
2016-04-13FireEyeDaniel Regalado, Erye Hernandez, Taha Karim, Varun Jian
Ghosts in the Endpoint
PLEAD
2016-04-13FireEyeDaniel Regalado, Erye Hernandez, Taha Karim, Varun Jian
Ghosts in the Endpoint
PLEAD
2016-04-13FireEyeDaniel Regalado, Erye Hernandez, Taha Karim, Varun Jian
Ghosts in the Endpoint
PLEAD
2009-03-29WikipediaVarious
GhostNet
Gh0stnet GhostNet
2009-03-28Infinitum LabsInformation Warfare Monitor
Tracking GhostNet: Investigating a Cyber Espionage Network
Ghost RAT GhostNet