Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-10-03Virus BulletinMichal Poslušný, Peter Kálnai
Lazarus Group A Mahjong Game Played with Different Sets of Tiles
Bankshot BanPolMex RAT FuwuqiDrama HOTWAX KillDisk (Lazarus) NACHOCHEESE REDSHAWL WannaCryptor
2018-07-26IEEE Symposium on Security and Privacy (SP)Alex C. Snoeren, Damon McCoy, Danny Yuxing Huang, Elie Bursztein, Jonathan Levin, Kirill Levchenko, Kylie McRoberts, Luca Invernizzi, Maxwell Matthaios Aliapoulios, Vector Guo Li
Tracking Ransomware End-to-end
Cerber Locky WannaCryptor
2018-06-07GigamonChenming Xu, Dan Caselden, Jason Jones, Justin Warner
Adobe Flash Zero-Day Leveraged for Targeted Attack in Middle East - Gigamon ATR Blog
Chainshot
2017-05-31SymantecJon DiMaggio
Operation Bachosens: A detailed look into a long-running cyber crime campaign
Bachosens
2017-05-03FireEyeDJ Palombo, Jon Erickson, Matthew McWhirt
To SDB, Or Not To SDB: FIN7 Leveraging Shim Databases for Persistence
FIN7
2017-04-21The Wall Street JournalJonathan Cheng, Josh Chin
China Hacked South Korea Over Missile Defense, U.S. Firm Says
Tonto Team
2017-04-21The Wall Street JournalJonathan Cheng, Josh Chin
China Hacked South Korea Over Missile Defense, U.S. Firm Says
Tonto Team
2017-02-27CylanceJon Gross
The Deception Project: A New Japanese-Centric Threat
Snake Wine
2017-02-27Threat VectorJon Gross
The Deception Project: A New Japanese-Centric Threat
ChChes Snake Wine
2016-12-07Cisco TalosBen Baker, Edmund Brumaghin, Jonas Zaddach, Mariano Graziano
Floki Bot Strikes, Talos and Flashpoint Respond
FlokiBot
2016-05-17SymantecJon DiMaggio
Indian organizations targeted in Suckfly attacks
APT22
2016-05-17Fox-ITDanny Heppener, Erik de Jong, Krijn de Mik, Lennart Haagsma, Maarten van Dantzig, Martin van Hensbergen, Mitchel Sahertian, Yonathan Klijnsma, Yun Zheng Hu
Mofang: A politically motivated information stealing adversary
Shim RAT Mofang
2016-05-17SymantecJon DiMaggio
Indian organizations targeted in Suckfly attacks
2016-04-28SymantecJon DiMaggio
Tick cyberespionage group zeros in on Japan
Tick
2016-04-26Github (CyberMonitor)Jason Jones
New Poison Ivy Activity Targeting Myanmar, Asian Countries
Poison Ivy
2016-03-29SymantecJon DiMaggio
Taiwan targeted with new cyberespionage back doorTrojan
Budminer
2016-03-29SymantecJon DiMaggio
Taiwan targeted with new cyberespionage back door Trojan
Dripion Budminer
2016-03-15SymantecJon DiMaggio
Suckfly: Revealing the secret life of your code signing certificates
APT22
2016-03-15SymantecJon DiMaggio
Suckfly: Revealing the secret life of your code signing certificates
2016-02-23CylanceCylance SPEAR Team, Jon Gross
Operation Dust Storm
Misdat Poldat Dust Storm