Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-08-06rinse and REpeat analysisJames Haughom
Reversing Cerber - RaaS
Cerber
2018-05-03McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
concealment_troy http_troy Lazarus Group
2018-01-01McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
Lazarus Group
2017-10-16Hirman Muhammad bin Abu Bakar, James Wong, Sergei Shevchenko
Taiwan Heist: Lazarus Tools and Ransomware
Bitsran Hermes
2017-10-16BAE SystemsHirman Muhammad bin Abu Bakar, James Wong, Sergei Shevchenko
Taiwan Heist: Lazarus Tools and Ransomware
BLINDTOAD Lazarus Group
2017-09-12FireEyeBen Read, Genwei Jiang, James T. Bennett
FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY,FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY
FinFisher RAT BlackOasis
2017-06-12FireEyeBarry Vengerik, James T. Bennett
Behind the CARBANAK Backdoor
Carbanak DRIFTPIN
2015-04-18FireEyeChris Phillips, Corbin Souffrant, Dan Caselden, Darien Kin, Genwei Jiang, James “Tom” Bennett, Jonathan Wrolstad, Joshua Homan, Yasir Khalid
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack
APT28
2014-09-04FireEyeJames T. Bennett, Mike Scott
Forced to Adapt: XSLCmd Backdoor Now on OS X
XSLCmd APT15
2014-02-19FireEyeJames T. Bennett, Nart Villeneuve
XtremeRAT: Nuisance or Threat?
Xtreme RAT
2013-12-12FireEye IncJames T. Bennett, Kenneth Geers, Mike Scott, Nart Villeneuve, Ned Moran, Thoufique Haq
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs
Tidepool APT15
2013-02-28FireEyeJames T. Bennett
It's a Kind of Magic
MiniDuke
2013-02-13FireEyeJames T. Bennett
The Number of the Beast
ItaDuke
2013-01-01McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
httpdropper
2012-10-23Trend MicroJames T. Bennett, Nart Villeneuve
Detecting APT Activity with Network Traffic Analysis
Enfal Gh0stnet Nitro sykipot taidoor
2011-10-26IntegoPeter James
Tsunami Backdoor Can Be Used for Denial of Service Attacks
Tsunami
2010-07-24SophosJames Wyke
Why won’t my sample run?
Zeus